juga0 / page_watcher_scraper

Scrapes code.iilab.org, meta.iilab.org, www.t-mobile.com, and 5 other domains

iilab Gitlab instance


Work in progress...

installation

system dependencies

sudo apt-get install python-dev

with virtualenv

obtain virtualenv

Check https://virtualenv.pypa.io/en/latest/installation.html or follow these instructions:

if Debian equal/newer than jessie (virtualenv version equal or greater than 1.9)
sudo apt-get install python-virtualenv
if Debian older than jessie (or virtualenv version prior to 1.9)
sudo apt-get install ca-certificates gnupg
curl https://pypi.python.org/packages/source/v/virtualenv/virtualenv-13.1.0.tar.gz#md5=70f63a429b7dd7c3e10f6af09ed32554 > /pathtovirtualenvdownload/virtualenv-13.1.0.tar.gz # or latest
curl https://pypi.python.org/packages/source/v/virtualenv/virtualenv-13.1.0.tar.gz.asc > /pathtovirtualenvdownload/virtualenv-13.1.0.tar.gz.asc # or latest
mkdir /tmp/.gnupg
chmod 700 /tmp/.gnupg
gpg --homedir /tmp/.gnupg --keyserver hkps.pool.sks-keyservers.net --recv-keys 3372DCFA
gpg --homedir /tmp/.gnupg --fingerprint 3372DCFA # check is 7C6B 7C5D 5E2B 6356 A926  F04F 6E3C BCE9 3372 DCFA
gpg --homedir /tmp/.gnupg --verify /pathtovirtualenvdownload/virtualenv-13.1.0.tar.gz.asc
tar xzf /pathtovirtualenvdownload/virtualenv-13.1.0.tar.gz --directory /pathtovirtualenvbin/
echo "alias virtualenv='python  /pathtovirtualenvbin/virtualenv-13.1.0/virtualenv.py'" >> ~/.bashrc # or other shell start
source ~/.bashrc # or other shell start

create a virtualenv

mkdir ~/.virtualenvs
virtualenv ~/.virtualenvs/oiienv
source ~/.virtualenvs/oiienv/bin/activate

install dependencies in virtualenv

git clone https://github.com/juga0/page_watcher_scraper
cd page_watcher_scraper
pip install -r requirements.txt

configuration

More about pagewatcherscraper/pagewatcherscraper/settings.py: TBD More about pagewatcherscraper/configlocal.py: TBD If you need local settings, edit pagewatcherscraper/pagewatcherscraper/settingslocal.py and pagewatcherscraper/config_local.py

running

To list the scrappers:

scrapy list

To run pagewatcherscraper:

cd page_watcher_scraper
./scraper.py

configuring cron job

Create an script like this replacing the path by your path:

cd page_watcher_scraper
vim run.sh

#!/bin/bash
cd /mypath/page_watcher_scraper && source /mypath/page_watcher_scraper/environment && source /mypath/.virtualenvs/oiienv/bin/activate && /mypath/.virtualenvs/oiienv/bin/python /mypath/page_watcher_scraper/scraper.py >> /mypath/page_watcher_scraper/cronlog.txt

Edit crontab:

crontab -e

To run every day at 14:35h:

35 14    * * * /bin/bash /home/duy/page_watcher_scraper/run.sh

Contributors juga0

Last run completed successfully .

Console output of last run

Injecting configuration and compiling...  -----> Python app detected -----> Installing python-2.7.6  $ pip install -r requirements.txt  Collecting Scrapy==1.0.5 (from -r requirements.txt (line 1))  /app/.heroku/python/lib/python2.7/site-packages/pip-8.1.2-py2.7.egg/pip/_vendor/requests/packages/urllib3/util/ssl_.py:318: SNIMissingWarning: An HTTPS request has been made, but the SNI (Subject Name Indication) extension to TLS is not available on this platform. This may cause the server to present an incorrect TLS certificate, which can cause validation failures. You can upgrade to a newer version of Python to solve this. For more information, see https://urllib3.readthedocs.org/en/latest/security.html#snimissingwarning.  SNIMissingWarning  /app/.heroku/python/lib/python2.7/site-packages/pip-8.1.2-py2.7.egg/pip/_vendor/requests/packages/urllib3/util/ssl_.py:122: InsecurePlatformWarning: A true SSLContext object is not available. This prevents urllib3 from configuring SSL appropriately and may cause certain SSL connections to fail. You can upgrade to a newer version of Python to solve this. For more information, see https://urllib3.readthedocs.org/en/latest/security.html#insecureplatformwarning.  InsecurePlatformWarning  Downloading Scrapy-1.0.5-py2-none-any.whl (291kB)  Collecting Twisted==16.1.1 (from -r requirements.txt (line 2))  Downloading Twisted-16.1.1.tar.bz2 (2.9MB)  Collecting service-identity==16.0.0 (from -r requirements.txt (line 3))  Downloading service_identity-16.0.0-py2.py3-none-any.whl  Collecting PyYAML==3.11 (from -r requirements.txt (line 4))  Downloading PyYAML-3.11.zip (371kB)  Collecting GitPython==2.0.0 (from -r requirements.txt (line 5))  Downloading GitPython-2.0.0.tar.gz (382kB)  Collecting html2text==2016.4.2 (from -r requirements.txt (line 6))  Downloading html2text-2016.4.2.tar.gz (45kB)  Collecting cssselect>=0.9 (from Scrapy==1.0.5->-r requirements.txt (line 1))  Downloading cssselect-1.0.1-py2.py3-none-any.whl  Collecting six>=1.5.2 (from Scrapy==1.0.5->-r requirements.txt (line 1))  Downloading six-1.10.0-py2.py3-none-any.whl  Collecting queuelib (from Scrapy==1.0.5->-r requirements.txt (line 1))  Downloading queuelib-1.4.2-py2.py3-none-any.whl  Collecting lxml (from Scrapy==1.0.5->-r requirements.txt (line 1))  Downloading lxml-3.7.3-cp27-cp27m-manylinux1_x86_64.whl (6.8MB)  Collecting w3lib>=1.8.0 (from Scrapy==1.0.5->-r requirements.txt (line 1))  Downloading w3lib-1.17.0-py2.py3-none-any.whl  Collecting pyOpenSSL (from Scrapy==1.0.5->-r requirements.txt (line 1))  Downloading pyOpenSSL-16.2.0-py2.py3-none-any.whl (43kB)  Collecting zope.interface>=3.6.0 (from Twisted==16.1.1->-r requirements.txt (line 2))  Downloading zope.interface-4.3.3.tar.gz (150kB)  Collecting attrs (from service-identity==16.0.0->-r requirements.txt (line 3))  Downloading attrs-16.3.0-py2.py3-none-any.whl  Collecting pyasn1-modules (from service-identity==16.0.0->-r requirements.txt (line 3))  Downloading pyasn1_modules-0.0.8-py2.py3-none-any.whl  Collecting pyasn1 (from service-identity==16.0.0->-r requirements.txt (line 3))  Downloading pyasn1-0.2.3-py2.py3-none-any.whl (53kB)  Collecting gitdb>=0.6.4 (from GitPython==2.0.0->-r requirements.txt (line 5))  Downloading gitdb-0.6.4.tar.gz (400kB)  Collecting cryptography>=1.3.4 (from pyOpenSSL->Scrapy==1.0.5->-r requirements.txt (line 1))  Downloading cryptography-1.7.2.tar.gz (420kB)  Collecting smmap>=0.8.5 (from gitdb>=0.6.4->GitPython==2.0.0->-r requirements.txt (line 5))  Downloading smmap-0.9.0.tar.gz  Collecting idna>=2.0 (from cryptography>=1.3.4->pyOpenSSL->Scrapy==1.0.5->-r requirements.txt (line 1))  Downloading idna-2.2-py2.py3-none-any.whl (55kB)  Collecting enum34 (from cryptography>=1.3.4->pyOpenSSL->Scrapy==1.0.5->-r requirements.txt (line 1))  Downloading enum34-1.1.6-py2-none-any.whl  Collecting ipaddress (from cryptography>=1.3.4->pyOpenSSL->Scrapy==1.0.5->-r requirements.txt (line 1))  Downloading ipaddress-1.0.18-py2-none-any.whl  Collecting cffi>=1.4.1 (from cryptography>=1.3.4->pyOpenSSL->Scrapy==1.0.5->-r requirements.txt (line 1))  Downloading cffi-1.9.1-cp27-cp27m-manylinux1_x86_64.whl (389kB)  Collecting pycparser (from cffi>=1.4.1->cryptography>=1.3.4->pyOpenSSL->Scrapy==1.0.5->-r requirements.txt (line 1))  Downloading pycparser-2.17.tar.gz (231kB)  Installing collected packages: cssselect, six, zope.interface, Twisted, queuelib, attrs, pyasn1, pyasn1-modules, idna, enum34, ipaddress, pycparser, cffi, cryptography, pyOpenSSL, service-identity, lxml, w3lib, Scrapy, PyYAML, smmap, gitdb, GitPython, html2text  Running setup.py install for zope.interface: started  Running setup.py install for zope.interface: finished with status 'done'  Running setup.py install for Twisted: started  Running setup.py install for Twisted: finished with status 'done'  Running setup.py install for pycparser: started  Running setup.py install for pycparser: finished with status 'done'  Running setup.py install for cryptography: started  Running setup.py install for cryptography: finished with status 'done'  Running setup.py install for PyYAML: started  Running setup.py install for PyYAML: finished with status 'done'  Running setup.py install for smmap: started  Running setup.py install for smmap: finished with status 'done'  Running setup.py install for gitdb: started  Running setup.py install for gitdb: finished with status 'done'  Running setup.py install for GitPython: started  Running setup.py install for GitPython: finished with status 'done'  Running setup.py install for html2text: started  Running setup.py install for html2text: finished with status 'done'  Successfully installed GitPython-2.0.0 PyYAML-3.11 Scrapy-1.0.5 Twisted-16.1.1 attrs-16.3.0 cffi-1.9.1 cryptography-1.7.2 cssselect-1.0.1 enum34-1.1.6 gitdb-0.6.4 html2text-2016.4.2 idna-2.2 ipaddress-1.0.18 lxml-3.7.3 pyOpenSSL-16.2.0 pyasn1-0.2.3 pyasn1-modules-0.0.8 pycparser-2.17 queuelib-1.4.2 service-identity-16.0.0 six-1.10.0 smmap-0.9.0 w3lib-1.17.0 zope.interface-4.3.3   ! Hello! It looks like your application is using an outdated version of Python.  ! This caused the security warning you saw above during the 'pip install' step.  ! We recommend 'python-2.7.12', which you can specify in a 'runtime.txt' file.  ! -- Much Love, Heroku.   -----> Discovering process types  Procfile declares types -> scraper Injecting scraper and running... Could not import config_local no local git command DEBUG:page_watcher:repo_name origin DEBUG:page_watcher:OBTAINING REPO DEBUG:page_watcher:CLONING DEBUG:page_watcher:pulling without git_ssh_command_path DEBUG:page_watcher:yaml data: DEBUG:page_watcher:[{'url': 'git@github.com:juga0/page-watcher-data.git', 'name': 'github'}] DEBUG:page_watcher:repo_name origin DEBUG:page_watcher:OBTAINING REPO DEBUG:page_watcher:CLONING DEBUG:page_watcher:pulling without git_ssh_command_path DEBUG:page_watcher:file_path privacy_policy.yml DEBUG:page_watcher:policy_type privacy_policy DEBUG:page_watcher:yaml data: DEBUG:page_watcher:None DEBUG:page_watcher:file_path privacy_policy.yml DEBUG:page_watcher:policy_type privacy_policy DEBUG:page_watcher:yaml data: DEBUG:page_watcher:{'url': 'http://www.t-mobile.com/company/website/privacypolicy.aspx#fullpolicy', 'xpath': "//div[@class='faq']"} DEBUG:page_watcher:file_path tos.yml DEBUG:page_watcher:policy_type tos DEBUG:page_watcher:yaml data: DEBUG:page_watcher:{'url': 'http://www.t-mobile.com/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditions&amp;print=true', 'xpath': "//div[@id='body']"} DEBUG:page_watcher:file_path privacy_policy.yml DEBUG:page_watcher:policy_type privacy_policy DEBUG:page_watcher:yaml data: DEBUG:page_watcher:{'url': 'https://telegram.org/privacy', 'xpath': "//div[@class='tl_page']"} DEBUG:page_watcher:file_path privacy_policy.yml DEBUG:page_watcher:policy_type privacy_policy DEBUG:page_watcher:yaml data: DEBUG:page_watcher:{'url': 'https://privacy.microsoft.com/en-us/privacystatement', 'xpath': "//div[@class='grid']"} DEBUG:page_watcher:file_path privacy_policy.yml DEBUG:page_watcher:policy_type privacy_policy DEBUG:page_watcher:yaml data: DEBUG:page_watcher:{'url': 'http://chatsecure.org/privacy/', 'xpath': '//article/div/section'} DEBUG:page_watcher:file_path tos.yml DEBUG:page_watcher:policy_type tos DEBUG:page_watcher:yaml data: DEBUG:page_watcher:{'url': 'https://www.whatsapp.com/legal/', 'xpath': "//section[@dir='ltr']"} DEBUG:page_watcher:file_path privacy_policy.yml DEBUG:page_watcher:policy_type privacy_policy DEBUG:page_watcher:yaml data: DEBUG:page_watcher:{'url': 'https://www.whispersystems.org/signal/privacy/', 'xpath': '//section/div/div/div'} DEBUG:page_watcher:[{'organization': 't-mobile', 'url': 'http://www.t-mobile.com/company/website/privacypolicy.aspx#fullpolicy', 'policy': 'privacy_policy', 'tool': 'gsm', 'xpath': "//div[@class='faq']"}, {'organization': 't-mobile', 'url': 'http://www.t-mobile.com/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditions&amp;print=true', 'policy': 'tos', 'tool': 'gsm', 'xpath': "//div[@id='body']"}, {'organization': 'telegram', 'url': 'https://telegram.org/privacy', 'policy': 'privacy_policy', 'tool': 'telegram', 'xpath': "//div[@class='tl_page']"}, {'organization': 'microsoft', 'url': 'https://privacy.microsoft.com/en-us/privacystatement', 'policy': 'privacy_policy', 'tool': 'skype', 'xpath': "//div[@class='grid']"}, {'organization': 'theguardianproject', 'url': 'http://chatsecure.org/privacy/', 'policy': 'privacy_policy', 'tool': 'chatsecure', 'xpath': '//article/div/section'}, {'organization': 'whatsapp', 'url': 'https://www.whatsapp.com/legal/', 'policy': 'tos', 'tool': 'whatsapp', 'xpath': "//section[@dir='ltr']"}, {'organization': 'whispersystems', 'url': 'https://www.whispersystems.org/signal/privacy/', 'policy': 'privacy_policy', 'tool': 'signal', 'xpath': '//section/div/div/div'}] DEBUG:page_watcher:ssh_dir ssh DEBUG:page_watcher:created dir ssh DEBUG:page_watcher:wroten /app/ssh/id_rsa.pub DEBUG:page_watcher:wroten /app/ssh/id_rsa DEBUG:page_watcher:running in morph.io DEBUG:page_watcher:wroten /app/ssh_command.sh DEBUG:page_watcher:with content #!/bin/sh ssh -i /app/ssh/id_rsa -o "UserKnownHostsFile /app/ssh/ssh_pub_key_server" -o "StrictHostKeyChecking no" "$@" DEBUG:page_watcher:wroten /app/ssh/ssh_pub_key_server DEBUG:page_watcher:with content github.com ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAq2A7hRGmdnm9tUDbO9IDSwBK6TbQa+PXYPCPy6rbTrTtw7PHkccKrpp0yVhp5HdEIcKr6pLlVDBfOLX9QUsyCOV0wzfjIJNlGEYsdlLJizHhbn2mUjvSAHQqZETYP81eFzLQNnPHt4EVVUh7VfDESU84KezmD5QlWpXLmvU31/yMf+Se8xhHTvKSCZIFImWwoG6mbUoWf9nzpIoaSjB+weqqUUmpaaasXVal72J+UX2B+2RPW3RcT0eOzQgqlJL3RKrTJvdsjE3JEAvGq3lGHSZXy28G3skua2SmVi/w4yCE6gbODqnTWlg7+wC604ydGXA8VJiS5ap43JXiUFFAaQ== DEBUG:__main__:repo name github DEBUG:page_watcher:OBTAINING REPO DEBUG:page_watcher:CLONING DEBUG:page_watcher:pulling with git_ssh_command_path /app/ssh_command.sh Could not import settings_local INFO:scrapy.utils.log:Scrapy 1.0.5 started (bot: page_watcher_scraper) 2017-02-26 16:56:16 [scrapy] INFO: Scrapy 1.0.5 started (bot: page_watcher_scraper) INFO:scrapy.utils.log:Optional features available: ssl, http11 2017-02-26 16:56:16 [scrapy] INFO: Optional features available: ssl, http11 INFO:scrapy.utils.log:Overridden settings: {'NEWSPIDER_MODULE': 'page_watcher_scraper.spiders', 'SPIDER_MODULES': ['page_watcher_scraper.spiders'], 'COMPRESSION_ENABLED': False, 'USER_AGENT': 'Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0', 'BOT_NAME': 'page_watcher_scraper', 'COOKIES_ENABLED': False} 2017-02-26 16:56:16 [scrapy] INFO: Overridden settings: {'NEWSPIDER_MODULE': 'page_watcher_scraper.spiders', 'SPIDER_MODULES': ['page_watcher_scraper.spiders'], 'COMPRESSION_ENABLED': False, 'USER_AGENT': 'Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0', 'BOT_NAME': 'page_watcher_scraper', 'COOKIES_ENABLED': False} INFO:scrapy.middleware:Enabled extensions: TelnetConsole, CloseSpider, LogStats, SpiderState, CoreStats 2017-02-26 16:56:16 [scrapy] INFO: Enabled extensions: TelnetConsole, CloseSpider, LogStats, SpiderState, CoreStats DEBUG:policies:in init 2017-02-26 16:56:16 [policies] DEBUG: in init DEBUG:policies:polices path: /app/page-watcher-data/t-mobile/gsm/privacy_policy.txt 2017-02-26 16:56:16 [policies] DEBUG: polices path: /app/page-watcher-data/t-mobile/gsm/privacy_policy.txt INFO:scrapy.middleware:Enabled downloader middlewares: HttpAuthMiddleware, DownloadTimeoutMiddleware, UserAgentMiddleware, RetryMiddleware, DefaultHeadersMiddleware, MetaRefreshMiddleware, RedirectMiddleware, ChunkedTransferMiddleware, DownloaderStats 2017-02-26 16:56:16 [scrapy] INFO: Enabled downloader middlewares: HttpAuthMiddleware, DownloadTimeoutMiddleware, UserAgentMiddleware, RetryMiddleware, DefaultHeadersMiddleware, MetaRefreshMiddleware, RedirectMiddleware, ChunkedTransferMiddleware, DownloaderStats INFO:scrapy.middleware:Enabled spider middlewares: HttpErrorMiddleware, OffsiteMiddleware, RefererMiddleware, UrlLengthMiddleware, DepthMiddleware 2017-02-26 16:56:16 [scrapy] INFO: Enabled spider middlewares: HttpErrorMiddleware, OffsiteMiddleware, RefererMiddleware, UrlLengthMiddleware, DepthMiddleware DEBUG:page_watcher_scraper.pipelines:crawler dir 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: crawler dir DEBUG:page_watcher_scraper.pipelines:['_Crawler__remove_handler', '__class__', '__delattr__', '__dict__', '__doc__', '__format__', '__getattribute__', '__hash__', '__init__', '__module__', '__new__', '__reduce__', '__reduce_ex__', '__repr__', '__setattr__', '__sizeof__', '__str__', '__subclasshook__', '__weakref__', '_create_engine', '_create_spider', 'crawl', 'crawling', 'engine', 'extensions', 'logformatter', 'settings', 'signals', 'spider', 'spidercls', 'spiders', 'stats', 'stop'] 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: ['_Crawler__remove_handler', '__class__', '__delattr__', '__dict__', '__doc__', '__format__', '__getattribute__', '__hash__', '__init__', '__module__', '__new__', '__reduce__', '__reduce_ex__', '__repr__', '__setattr__', '__sizeof__', '__str__', '__subclasshook__', '__weakref__', '_create_engine', '_create_spider', 'crawl', 'crawling', 'engine', 'extensions', 'logformatter', 'settings', 'signals', 'spider', 'spidercls', 'spiders', 'stats', 'stop'] DEBUG:page_watcher_scraper.pipelines: 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: INFO:scrapy.middleware:Enabled item pipelines: PageWatcherScraperPipeline 2017-02-26 16:56:16 [scrapy] INFO: Enabled item pipelines: PageWatcherScraperPipeline INFO:scrapy.core.engine:Spider opened 2017-02-26 16:56:16 [scrapy] INFO: Spider opened DEBUG:page_watcher_scraper.pipelines:opening policy file 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: opening policy file INFO:scrapy.extensions.logstats:Crawled 0 pages (at 0 pages/min), scraped 0 items (at 0 items/min) 2017-02-26 16:56:16 [scrapy] INFO: Crawled 0 pages (at 0 pages/min), scraped 0 items (at 0 items/min) DEBUG:scrapy.telnet:Telnet console listening on 127.0.0.1:6023 2017-02-26 16:56:16 [scrapy] DEBUG: Telnet console listening on 127.0.0.1:6023 INFO:scrapy.middleware:Enabled extensions: TelnetConsole, CloseSpider, LogStats, SpiderState, CoreStats 2017-02-26 16:56:16 [scrapy] INFO: Enabled extensions: TelnetConsole, CloseSpider, LogStats, SpiderState, CoreStats DEBUG:policies:in init 2017-02-26 16:56:16 [policies] DEBUG: in init DEBUG:policies:polices path: /app/page-watcher-data/t-mobile/gsm/tos.txt 2017-02-26 16:56:16 [policies] DEBUG: polices path: /app/page-watcher-data/t-mobile/gsm/tos.txt INFO:scrapy.middleware:Enabled downloader middlewares: HttpAuthMiddleware, DownloadTimeoutMiddleware, UserAgentMiddleware, RetryMiddleware, DefaultHeadersMiddleware, MetaRefreshMiddleware, RedirectMiddleware, ChunkedTransferMiddleware, DownloaderStats 2017-02-26 16:56:16 [scrapy] INFO: Enabled downloader middlewares: HttpAuthMiddleware, DownloadTimeoutMiddleware, UserAgentMiddleware, RetryMiddleware, DefaultHeadersMiddleware, MetaRefreshMiddleware, RedirectMiddleware, ChunkedTransferMiddleware, DownloaderStats INFO:scrapy.middleware:Enabled spider middlewares: HttpErrorMiddleware, OffsiteMiddleware, RefererMiddleware, UrlLengthMiddleware, DepthMiddleware 2017-02-26 16:56:16 [scrapy] INFO: Enabled spider middlewares: HttpErrorMiddleware, OffsiteMiddleware, RefererMiddleware, UrlLengthMiddleware, DepthMiddleware DEBUG:page_watcher_scraper.pipelines:crawler dir 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: crawler dir DEBUG:page_watcher_scraper.pipelines:['_Crawler__remove_handler', '__class__', '__delattr__', '__dict__', '__doc__', '__format__', '__getattribute__', '__hash__', '__init__', '__module__', '__new__', '__reduce__', '__reduce_ex__', '__repr__', '__setattr__', '__sizeof__', '__str__', '__subclasshook__', '__weakref__', '_create_engine', '_create_spider', 'crawl', 'crawling', 'engine', 'extensions', 'logformatter', 'settings', 'signals', 'spider', 'spidercls', 'spiders', 'stats', 'stop'] 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: ['_Crawler__remove_handler', '__class__', '__delattr__', '__dict__', '__doc__', '__format__', '__getattribute__', '__hash__', '__init__', '__module__', '__new__', '__reduce__', '__reduce_ex__', '__repr__', '__setattr__', '__sizeof__', '__str__', '__subclasshook__', '__weakref__', '_create_engine', '_create_spider', 'crawl', 'crawling', 'engine', 'extensions', 'logformatter', 'settings', 'signals', 'spider', 'spidercls', 'spiders', 'stats', 'stop'] DEBUG:page_watcher_scraper.pipelines: 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: INFO:scrapy.middleware:Enabled item pipelines: PageWatcherScraperPipeline 2017-02-26 16:56:16 [scrapy] INFO: Enabled item pipelines: PageWatcherScraperPipeline INFO:scrapy.core.engine:Spider opened 2017-02-26 16:56:16 [scrapy] INFO: Spider opened DEBUG:page_watcher_scraper.pipelines:opening policy file 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: opening policy file INFO:scrapy.extensions.logstats:Crawled 0 pages (at 0 pages/min), scraped 0 items (at 0 items/min) 2017-02-26 16:56:16 [scrapy] INFO: Crawled 0 pages (at 0 pages/min), scraped 0 items (at 0 items/min) DEBUG:scrapy.telnet:Telnet console listening on 127.0.0.1:6024 2017-02-26 16:56:16 [scrapy] DEBUG: Telnet console listening on 127.0.0.1:6024 INFO:scrapy.middleware:Enabled extensions: TelnetConsole, CloseSpider, LogStats, SpiderState, CoreStats 2017-02-26 16:56:16 [scrapy] INFO: Enabled extensions: TelnetConsole, CloseSpider, LogStats, SpiderState, CoreStats DEBUG:policies:in init 2017-02-26 16:56:16 [policies] DEBUG: in init DEBUG:policies:polices path: /app/page-watcher-data/telegram/telegram/privacy_policy.txt 2017-02-26 16:56:16 [policies] DEBUG: polices path: /app/page-watcher-data/telegram/telegram/privacy_policy.txt INFO:scrapy.middleware:Enabled downloader middlewares: HttpAuthMiddleware, DownloadTimeoutMiddleware, UserAgentMiddleware, RetryMiddleware, DefaultHeadersMiddleware, MetaRefreshMiddleware, RedirectMiddleware, ChunkedTransferMiddleware, DownloaderStats 2017-02-26 16:56:16 [scrapy] INFO: Enabled downloader middlewares: HttpAuthMiddleware, DownloadTimeoutMiddleware, UserAgentMiddleware, RetryMiddleware, DefaultHeadersMiddleware, MetaRefreshMiddleware, RedirectMiddleware, ChunkedTransferMiddleware, DownloaderStats INFO:scrapy.middleware:Enabled spider middlewares: HttpErrorMiddleware, OffsiteMiddleware, RefererMiddleware, UrlLengthMiddleware, DepthMiddleware 2017-02-26 16:56:16 [scrapy] INFO: Enabled spider middlewares: HttpErrorMiddleware, OffsiteMiddleware, RefererMiddleware, UrlLengthMiddleware, DepthMiddleware DEBUG:page_watcher_scraper.pipelines:crawler dir 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: crawler dir DEBUG:page_watcher_scraper.pipelines:['_Crawler__remove_handler', '__class__', '__delattr__', '__dict__', '__doc__', '__format__', '__getattribute__', '__hash__', '__init__', '__module__', '__new__', '__reduce__', '__reduce_ex__', '__repr__', '__setattr__', '__sizeof__', '__str__', '__subclasshook__', '__weakref__', '_create_engine', '_create_spider', 'crawl', 'crawling', 'engine', 'extensions', 'logformatter', 'settings', 'signals', 'spider', 'spidercls', 'spiders', 'stats', 'stop'] 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: ['_Crawler__remove_handler', '__class__', '__delattr__', '__dict__', '__doc__', '__format__', '__getattribute__', '__hash__', '__init__', '__module__', '__new__', '__reduce__', '__reduce_ex__', '__repr__', '__setattr__', '__sizeof__', '__str__', '__subclasshook__', '__weakref__', '_create_engine', '_create_spider', 'crawl', 'crawling', 'engine', 'extensions', 'logformatter', 'settings', 'signals', 'spider', 'spidercls', 'spiders', 'stats', 'stop'] DEBUG:page_watcher_scraper.pipelines: 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: INFO:scrapy.middleware:Enabled item pipelines: PageWatcherScraperPipeline 2017-02-26 16:56:16 [scrapy] INFO: Enabled item pipelines: PageWatcherScraperPipeline INFO:scrapy.core.engine:Spider opened 2017-02-26 16:56:16 [scrapy] INFO: Spider opened DEBUG:page_watcher_scraper.pipelines:opening policy file 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: opening policy file INFO:scrapy.extensions.logstats:Crawled 0 pages (at 0 pages/min), scraped 0 items (at 0 items/min) 2017-02-26 16:56:16 [scrapy] INFO: Crawled 0 pages (at 0 pages/min), scraped 0 items (at 0 items/min) DEBUG:scrapy.telnet:Telnet console listening on 127.0.0.1:6025 2017-02-26 16:56:16 [scrapy] DEBUG: Telnet console listening on 127.0.0.1:6025 INFO:scrapy.middleware:Enabled extensions: TelnetConsole, CloseSpider, LogStats, SpiderState, CoreStats 2017-02-26 16:56:16 [scrapy] INFO: Enabled extensions: TelnetConsole, CloseSpider, LogStats, SpiderState, CoreStats DEBUG:policies:in init 2017-02-26 16:56:16 [policies] DEBUG: in init DEBUG:policies:polices path: /app/page-watcher-data/microsoft/skype/privacy_policy.txt 2017-02-26 16:56:16 [policies] DEBUG: polices path: /app/page-watcher-data/microsoft/skype/privacy_policy.txt INFO:scrapy.middleware:Enabled downloader middlewares: HttpAuthMiddleware, DownloadTimeoutMiddleware, UserAgentMiddleware, RetryMiddleware, DefaultHeadersMiddleware, MetaRefreshMiddleware, RedirectMiddleware, ChunkedTransferMiddleware, DownloaderStats 2017-02-26 16:56:16 [scrapy] INFO: Enabled downloader middlewares: HttpAuthMiddleware, DownloadTimeoutMiddleware, UserAgentMiddleware, RetryMiddleware, DefaultHeadersMiddleware, MetaRefreshMiddleware, RedirectMiddleware, ChunkedTransferMiddleware, DownloaderStats INFO:scrapy.middleware:Enabled spider middlewares: HttpErrorMiddleware, OffsiteMiddleware, RefererMiddleware, UrlLengthMiddleware, DepthMiddleware 2017-02-26 16:56:16 [scrapy] INFO: Enabled spider middlewares: HttpErrorMiddleware, OffsiteMiddleware, RefererMiddleware, UrlLengthMiddleware, DepthMiddleware DEBUG:page_watcher_scraper.pipelines:crawler dir 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: crawler dir DEBUG:page_watcher_scraper.pipelines:['_Crawler__remove_handler', '__class__', '__delattr__', '__dict__', '__doc__', '__format__', '__getattribute__', '__hash__', '__init__', '__module__', '__new__', '__reduce__', '__reduce_ex__', '__repr__', '__setattr__', '__sizeof__', '__str__', '__subclasshook__', '__weakref__', '_create_engine', '_create_spider', 'crawl', 'crawling', 'engine', 'extensions', 'logformatter', 'settings', 'signals', 'spider', 'spidercls', 'spiders', 'stats', 'stop'] 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: ['_Crawler__remove_handler', '__class__', '__delattr__', '__dict__', '__doc__', '__format__', '__getattribute__', '__hash__', '__init__', '__module__', '__new__', '__reduce__', '__reduce_ex__', '__repr__', '__setattr__', '__sizeof__', '__str__', '__subclasshook__', '__weakref__', '_create_engine', '_create_spider', 'crawl', 'crawling', 'engine', 'extensions', 'logformatter', 'settings', 'signals', 'spider', 'spidercls', 'spiders', 'stats', 'stop'] DEBUG:page_watcher_scraper.pipelines: 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: INFO:scrapy.middleware:Enabled item pipelines: PageWatcherScraperPipeline 2017-02-26 16:56:16 [scrapy] INFO: Enabled item pipelines: PageWatcherScraperPipeline INFO:scrapy.core.engine:Spider opened 2017-02-26 16:56:16 [scrapy] INFO: Spider opened DEBUG:page_watcher_scraper.pipelines:opening policy file 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: opening policy file INFO:scrapy.extensions.logstats:Crawled 0 pages (at 0 pages/min), scraped 0 items (at 0 items/min) 2017-02-26 16:56:16 [scrapy] INFO: Crawled 0 pages (at 0 pages/min), scraped 0 items (at 0 items/min) DEBUG:scrapy.telnet:Telnet console listening on 127.0.0.1:6026 2017-02-26 16:56:16 [scrapy] DEBUG: Telnet console listening on 127.0.0.1:6026 INFO:scrapy.middleware:Enabled extensions: TelnetConsole, CloseSpider, LogStats, SpiderState, CoreStats 2017-02-26 16:56:16 [scrapy] INFO: Enabled extensions: TelnetConsole, CloseSpider, LogStats, SpiderState, CoreStats DEBUG:policies:in init 2017-02-26 16:56:16 [policies] DEBUG: in init DEBUG:policies:polices path: /app/page-watcher-data/theguardianproject/chatsecure/privacy_policy.txt 2017-02-26 16:56:16 [policies] DEBUG: polices path: /app/page-watcher-data/theguardianproject/chatsecure/privacy_policy.txt INFO:scrapy.middleware:Enabled downloader middlewares: HttpAuthMiddleware, DownloadTimeoutMiddleware, UserAgentMiddleware, RetryMiddleware, DefaultHeadersMiddleware, MetaRefreshMiddleware, RedirectMiddleware, ChunkedTransferMiddleware, DownloaderStats 2017-02-26 16:56:16 [scrapy] INFO: Enabled downloader middlewares: HttpAuthMiddleware, DownloadTimeoutMiddleware, UserAgentMiddleware, RetryMiddleware, DefaultHeadersMiddleware, MetaRefreshMiddleware, RedirectMiddleware, ChunkedTransferMiddleware, DownloaderStats INFO:scrapy.middleware:Enabled spider middlewares: HttpErrorMiddleware, OffsiteMiddleware, RefererMiddleware, UrlLengthMiddleware, DepthMiddleware 2017-02-26 16:56:16 [scrapy] INFO: Enabled spider middlewares: HttpErrorMiddleware, OffsiteMiddleware, RefererMiddleware, UrlLengthMiddleware, DepthMiddleware DEBUG:page_watcher_scraper.pipelines:crawler dir 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: crawler dir DEBUG:page_watcher_scraper.pipelines:['_Crawler__remove_handler', '__class__', '__delattr__', '__dict__', '__doc__', '__format__', '__getattribute__', '__hash__', '__init__', '__module__', '__new__', '__reduce__', '__reduce_ex__', '__repr__', '__setattr__', '__sizeof__', '__str__', '__subclasshook__', '__weakref__', '_create_engine', '_create_spider', 'crawl', 'crawling', 'engine', 'extensions', 'logformatter', 'settings', 'signals', 'spider', 'spidercls', 'spiders', 'stats', 'stop'] 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: ['_Crawler__remove_handler', '__class__', '__delattr__', '__dict__', '__doc__', '__format__', '__getattribute__', '__hash__', '__init__', '__module__', '__new__', '__reduce__', '__reduce_ex__', '__repr__', '__setattr__', '__sizeof__', '__str__', '__subclasshook__', '__weakref__', '_create_engine', '_create_spider', 'crawl', 'crawling', 'engine', 'extensions', 'logformatter', 'settings', 'signals', 'spider', 'spidercls', 'spiders', 'stats', 'stop'] DEBUG:page_watcher_scraper.pipelines: 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: INFO:scrapy.middleware:Enabled item pipelines: PageWatcherScraperPipeline 2017-02-26 16:56:16 [scrapy] INFO: Enabled item pipelines: PageWatcherScraperPipeline INFO:scrapy.core.engine:Spider opened 2017-02-26 16:56:16 [scrapy] INFO: Spider opened DEBUG:page_watcher_scraper.pipelines:opening policy file 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: opening policy file INFO:scrapy.extensions.logstats:Crawled 0 pages (at 0 pages/min), scraped 0 items (at 0 items/min) 2017-02-26 16:56:16 [scrapy] INFO: Crawled 0 pages (at 0 pages/min), scraped 0 items (at 0 items/min) DEBUG:scrapy.telnet:Telnet console listening on 127.0.0.1:6027 2017-02-26 16:56:16 [scrapy] DEBUG: Telnet console listening on 127.0.0.1:6027 INFO:scrapy.middleware:Enabled extensions: TelnetConsole, CloseSpider, LogStats, SpiderState, CoreStats 2017-02-26 16:56:16 [scrapy] INFO: Enabled extensions: TelnetConsole, CloseSpider, LogStats, SpiderState, CoreStats DEBUG:policies:in init 2017-02-26 16:56:16 [policies] DEBUG: in init DEBUG:policies:polices path: /app/page-watcher-data/whatsapp/whatsapp/tos.txt 2017-02-26 16:56:16 [policies] DEBUG: polices path: /app/page-watcher-data/whatsapp/whatsapp/tos.txt INFO:scrapy.middleware:Enabled downloader middlewares: HttpAuthMiddleware, DownloadTimeoutMiddleware, UserAgentMiddleware, RetryMiddleware, DefaultHeadersMiddleware, MetaRefreshMiddleware, RedirectMiddleware, ChunkedTransferMiddleware, DownloaderStats 2017-02-26 16:56:16 [scrapy] INFO: Enabled downloader middlewares: HttpAuthMiddleware, DownloadTimeoutMiddleware, UserAgentMiddleware, RetryMiddleware, DefaultHeadersMiddleware, MetaRefreshMiddleware, RedirectMiddleware, ChunkedTransferMiddleware, DownloaderStats INFO:scrapy.middleware:Enabled spider middlewares: HttpErrorMiddleware, OffsiteMiddleware, RefererMiddleware, UrlLengthMiddleware, DepthMiddleware 2017-02-26 16:56:16 [scrapy] INFO: Enabled spider middlewares: HttpErrorMiddleware, OffsiteMiddleware, RefererMiddleware, UrlLengthMiddleware, DepthMiddleware DEBUG:page_watcher_scraper.pipelines:crawler dir 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: crawler dir DEBUG:page_watcher_scraper.pipelines:['_Crawler__remove_handler', '__class__', '__delattr__', '__dict__', '__doc__', '__format__', '__getattribute__', '__hash__', '__init__', '__module__', '__new__', '__reduce__', '__reduce_ex__', '__repr__', '__setattr__', '__sizeof__', '__str__', '__subclasshook__', '__weakref__', '_create_engine', '_create_spider', 'crawl', 'crawling', 'engine', 'extensions', 'logformatter', 'settings', 'signals', 'spider', 'spidercls', 'spiders', 'stats', 'stop'] 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: ['_Crawler__remove_handler', '__class__', '__delattr__', '__dict__', '__doc__', '__format__', '__getattribute__', '__hash__', '__init__', '__module__', '__new__', '__reduce__', '__reduce_ex__', '__repr__', '__setattr__', '__sizeof__', '__str__', '__subclasshook__', '__weakref__', '_create_engine', '_create_spider', 'crawl', 'crawling', 'engine', 'extensions', 'logformatter', 'settings', 'signals', 'spider', 'spidercls', 'spiders', 'stats', 'stop'] DEBUG:page_watcher_scraper.pipelines: 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: INFO:scrapy.middleware:Enabled item pipelines: PageWatcherScraperPipeline 2017-02-26 16:56:16 [scrapy] INFO: Enabled item pipelines: PageWatcherScraperPipeline INFO:scrapy.core.engine:Spider opened 2017-02-26 16:56:16 [scrapy] INFO: Spider opened DEBUG:page_watcher_scraper.pipelines:opening policy file 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: opening policy file INFO:scrapy.extensions.logstats:Crawled 0 pages (at 0 pages/min), scraped 0 items (at 0 items/min) 2017-02-26 16:56:16 [scrapy] INFO: Crawled 0 pages (at 0 pages/min), scraped 0 items (at 0 items/min) DEBUG:scrapy.telnet:Telnet console listening on 127.0.0.1:6028 2017-02-26 16:56:16 [scrapy] DEBUG: Telnet console listening on 127.0.0.1:6028 INFO:scrapy.middleware:Enabled extensions: TelnetConsole, CloseSpider, LogStats, SpiderState, CoreStats 2017-02-26 16:56:16 [scrapy] INFO: Enabled extensions: TelnetConsole, CloseSpider, LogStats, SpiderState, CoreStats DEBUG:policies:in init 2017-02-26 16:56:16 [policies] DEBUG: in init DEBUG:policies:polices path: /app/page-watcher-data/whispersystems/signal/privacy_policy.txt 2017-02-26 16:56:16 [policies] DEBUG: polices path: /app/page-watcher-data/whispersystems/signal/privacy_policy.txt INFO:scrapy.middleware:Enabled downloader middlewares: HttpAuthMiddleware, DownloadTimeoutMiddleware, UserAgentMiddleware, RetryMiddleware, DefaultHeadersMiddleware, MetaRefreshMiddleware, RedirectMiddleware, ChunkedTransferMiddleware, DownloaderStats 2017-02-26 16:56:16 [scrapy] INFO: Enabled downloader middlewares: HttpAuthMiddleware, DownloadTimeoutMiddleware, UserAgentMiddleware, RetryMiddleware, DefaultHeadersMiddleware, MetaRefreshMiddleware, RedirectMiddleware, ChunkedTransferMiddleware, DownloaderStats INFO:scrapy.middleware:Enabled spider middlewares: HttpErrorMiddleware, OffsiteMiddleware, RefererMiddleware, UrlLengthMiddleware, DepthMiddleware 2017-02-26 16:56:16 [scrapy] INFO: Enabled spider middlewares: HttpErrorMiddleware, OffsiteMiddleware, RefererMiddleware, UrlLengthMiddleware, DepthMiddleware DEBUG:page_watcher_scraper.pipelines:crawler dir 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: crawler dir DEBUG:page_watcher_scraper.pipelines:['_Crawler__remove_handler', '__class__', '__delattr__', '__dict__', '__doc__', '__format__', '__getattribute__', '__hash__', '__init__', '__module__', '__new__', '__reduce__', '__reduce_ex__', '__repr__', '__setattr__', '__sizeof__', '__str__', '__subclasshook__', '__weakref__', '_create_engine', '_create_spider', 'crawl', 'crawling', 'engine', 'extensions', 'logformatter', 'settings', 'signals', 'spider', 'spidercls', 'spiders', 'stats', 'stop'] 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: ['_Crawler__remove_handler', '__class__', '__delattr__', '__dict__', '__doc__', '__format__', '__getattribute__', '__hash__', '__init__', '__module__', '__new__', '__reduce__', '__reduce_ex__', '__repr__', '__setattr__', '__sizeof__', '__str__', '__subclasshook__', '__weakref__', '_create_engine', '_create_spider', 'crawl', 'crawling', 'engine', 'extensions', 'logformatter', 'settings', 'signals', 'spider', 'spidercls', 'spiders', 'stats', 'stop'] DEBUG:page_watcher_scraper.pipelines: 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: INFO:scrapy.middleware:Enabled item pipelines: PageWatcherScraperPipeline 2017-02-26 16:56:16 [scrapy] INFO: Enabled item pipelines: PageWatcherScraperPipeline INFO:scrapy.core.engine:Spider opened 2017-02-26 16:56:16 [scrapy] INFO: Spider opened DEBUG:page_watcher_scraper.pipelines:opening policy file 2017-02-26 16:56:16 [page_watcher_scraper.pipelines] DEBUG: opening policy file INFO:scrapy.extensions.logstats:Crawled 0 pages (at 0 pages/min), scraped 0 items (at 0 items/min) 2017-02-26 16:56:16 [scrapy] INFO: Crawled 0 pages (at 0 pages/min), scraped 0 items (at 0 items/min) DEBUG:scrapy.telnet:Telnet console listening on 127.0.0.1:6029 2017-02-26 16:56:16 [scrapy] DEBUG: Telnet console listening on 127.0.0.1:6029 DEBUG:__main__:starting crawler 2017-02-26 16:56:16 [__main__] DEBUG: starting crawler DEBUG:scrapy.downloadermiddlewares.redirect:Redirecting (301) to <GET https://www.t-mobile.com/company/website/privacypolicy.aspx> from <GET http://www.t-mobile.com/company/website/privacypolicy.aspx#fullpolicy> 2017-02-26 16:56:16 [scrapy] DEBUG: Redirecting (301) to <GET https://www.t-mobile.com/company/website/privacypolicy.aspx> from <GET http://www.t-mobile.com/company/website/privacypolicy.aspx#fullpolicy> DEBUG:scrapy.downloadermiddlewares.redirect:Redirecting (301) to <GET https://www.t-mobile.com/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditions&amp;print=true> from <GET http://www.t-mobile.com/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditions&amp;print=true> 2017-02-26 16:56:16 [scrapy] DEBUG: Redirecting (301) to <GET https://www.t-mobile.com/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditions&amp;print=true> from <GET http://www.t-mobile.com/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditions&amp;print=true> DEBUG:scrapy.core.engine:Crawled (200) <GET http://chatsecure.org/privacy/> (referer: None) 2017-02-26 16:56:16 [scrapy] DEBUG: Crawled (200) <GET http://chatsecure.org/privacy/> (referer: None) DEBUG:policies:in handle response 2017-02-26 16:56:16 [policies] DEBUG: in handle response DEBUG:policies:wroten log ok /app/log/2017-02-26T16-56-16_ok_url.log 2017-02-26 16:56:16 [policies] DEBUG: wroten log ok /app/log/2017-02-26T16-56-16_ok_url.log DEBUG:page_watcher_scraper.util:{'item': 'chatsecure.org_privacy_', 'name': 'policies', 'time': '2017-02-26T16-56-16'} 2017-02-26 16:56:16 [page_watcher_scraper.util] DEBUG: {'item': 'chatsecure.org_privacy_', 'name': 'policies', 'time': '2017-02-26T16-56-16'} DEBUG:page_watcher_scraper.util:saving html /app/html/2017-02-26T16-56-16-policies-chatsecure.org_privacy_.html 2017-02-26 16:56:16 [page_watcher_scraper.util] DEBUG: saving html /app/html/2017-02-26T16-56-16-policies-chatsecure.org_privacy_.html Error during info_callback Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 421, in dataReceived self._write(bytes) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 569, in _write sent = self._tlsConnection.send(toSend) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 1255, in send result = _lib.SSL_write(self._ssl, buf, len(buf)) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) --- <exception caught here> --- File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1154, in infoCallback return wrapped(connection, where, ret) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1253, in _identityVerifyingInfoCallback verifyHostname(connection, self._hostnameASCII) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 44, in verify_hostname cert_patterns=extract_ids(connection.get_peer_certificate()), File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 73, in extract_ids ids.append(DNSPattern(n.getComponent().asOctets())) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/_common.py", line 156, in __init__ "Invalid DNS pattern {0!r}.".format(pattern) service_identity.exceptions.CertificateError: Invalid DNS pattern '192.155.212.202'. CRITICAL:twisted:Error during info_callback Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 421, in dataReceived self._write(bytes) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 569, in _write sent = self._tlsConnection.send(toSend) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 1255, in send result = _lib.SSL_write(self._ssl, buf, len(buf)) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) --- <exception caught here> --- File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1154, in infoCallback return wrapped(connection, where, ret) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1253, in _identityVerifyingInfoCallback verifyHostname(connection, self._hostnameASCII) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 44, in verify_hostname cert_patterns=extract_ids(connection.get_peer_certificate()), File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 73, in extract_ids ids.append(DNSPattern(n.getComponent().asOctets())) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/_common.py", line 156, in __init__ "Invalid DNS pattern {0!r}.".format(pattern) service_identity.exceptions.CertificateError: Invalid DNS pattern '192.155.212.202'. 2017-02-26 16:56:16 [twisted] CRITICAL: Error during info_callback Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 421, in dataReceived self._write(bytes) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 569, in _write sent = self._tlsConnection.send(toSend) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 1255, in send result = _lib.SSL_write(self._ssl, buf, len(buf)) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) --- <exception caught here> --- File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1154, in infoCallback return wrapped(connection, where, ret) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1253, in _identityVerifyingInfoCallback verifyHostname(connection, self._hostnameASCII) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 44, in verify_hostname cert_patterns=extract_ids(connection.get_peer_certificate()), File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 73, in extract_ids ids.append(DNSPattern(n.getComponent().asOctets())) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/_common.py", line 156, in __init__ "Invalid DNS pattern {0!r}.".format(pattern) service_identity.exceptions.CertificateError: Invalid DNS pattern '192.155.212.202'. From cffi callback <function infoCallback at 0x3f8c5f0>: Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1158, in infoCallback connection.get_app_data().failVerification(f) AttributeError: 'NoneType' object has no attribute 'failVerification' DEBUG:page_watcher_scraper.pipelines:writing policy to file /app/page-watcher-data/theguardianproject/chatsecure/privacy_policy.txt 2017-02-26 16:56:17 [page_watcher_scraper.pipelines] DEBUG: writing policy to file /app/page-watcher-data/theguardianproject/chatsecure/privacy_policy.txt DEBUG:scrapy.core.scraper:Scraped from <200 http://chatsecure.org/privacy/> {'content': u'<section>\n <p>This document is modeled after the <a href="http://automattic.com/privacy/">Creative Commons Privacy Policy</a> from <a href="http://automattic.com">Automattic</a>.</p>\n\n<h2 id="website-visitors">Website Visitors</h2>\n<p>Like most website operators, ChatSecure collects non-personally-identifying information of the sort that web browsers and servers typically make available, such as the browser type, language preference, referring site, and the date and time of each visitor request. ChatSecure\u2019s purpose in collecting non-personally identifying information is to better understand how ChatSecure\u2019s visitors use its website. From time to time, ChatSecure may release non-personally-identifying information in the aggregate, e.g., by publishing a report on trends in the usage of its website.</p>\n\n<p>To protect your privacy, we recommend using a browser plugin to block 3rd party tracking services, such as <a href="http://www.ghostery.com">Ghostery</a>.</p>\n\n<h2 id="mobile-apps">Mobile Apps</h2>\n\n<p>We purposefully do not include any analytics code in our mobile applications to help preserve your privacy. When using ChatSecure to connect to 3rd party chat servers, you are relying on those service\u2019s privacy policies as well. For example, if you use ChatSecure with Google Talk, you should be mindful of <a href="https://www.google.com/intl/en/policies/privacy/">Google\u2019s Privacy Policy</a>.</p>\n\n<p>At this time, the only other data that can be submitted to a 3rd party is our opt-in, anonymized crash report data, provided by the open source crash reporting SDK from <a href="http://hockeyapp.net">HockeyApp</a>.</p>\n\n<h2 id="gathering-of-personally-identifying-information">Gathering of Personally-Identifying Information</h2>\n<p>Certain visitors to ChatSecure\u2019s websites choose to interact with ChatSecure in ways that require ChatSecure to gather personally-identifying information. The amount and type of information that ChatSecure gathers depends on the nature of the interaction. In each case, ChatSecure collects such information only insofar as is necessary or appropriate to fulfill the purpose of the visitor\u2019s interaction with ChatSecure. ChatSecure does not disclose personally-identifying information other than as described below. And visitors can always refuse to supply personally-identifying information, with the caveat that it may prevent them from engaging in certain website-related activities.</p>\n\n<h2 id="aggregated-statistics">Aggregated Statistics</h2>\n<p>ChatSecure may collect statistics about the behavior of visitors to its websites. ChatSecure may display this information publicly or provide it to others. However, ChatSecure does not disclose personally-identifying information other than as described below.</p>\n\n<h2 id="protection-of-certain-personally-identifying-information">Protection of Certain Personally-Identifying Information</h2>\n<p>ChatSecure discloses potentially personally-identifying and personally-identifying information only to those of its employees, contractors and affiliated organizations that (i) need to know that information in order to process it on ChatSecure\u2019s behalf or to provide services available at ChatSecure\u2019s websites, and (ii) that have agreed not to disclose it to others. Some of those employees, contractors and affiliated organizations may be located outside of your home country; by using ChatSecure\u2019s websites, you consent to the transfer of such information to them. ChatSecure will not rent or sell potentially personally-identifying and personally-identifying information to anyone. Other than to its employees, contractors and affiliated organizations, as described above, ChatSecure discloses potentially personally-identifying and personally-identifying information only in response to a subpoena, court order or other governmental request, or when ChatSecure believes in good faith that disclosure is reasonably necessary to protect the property or rights of ChatSecure, third parties or the public at large. If you are a registered user of an ChatSecure website and have supplied your email address, ChatSecure may occasionally send you an email to tell you about new features, solicit your feedback, or just keep you up to date with what\u2019s going on with ChatSecure and our products. We primarily use our various product blogs to communicate this type of information, so we expect to keep this type of email to a minimum. If you send us a request (for example via a support email or via one of our feedback mechanisms), we reserve the right to publish it in order to help us clarify or respond to your request or to help us support other users. ChatSecure takes all measures reasonably necessary to protect against the unauthorized access, use, alteration or destruction of potentially personally-identifying and personally-identifying information.</p>\n\n<h2 id="cookies">Cookies</h2>\n<p>A cookie is a string of information that a website stores on a visitor\u2019s computer, and that the visitor\u2019s browser provides to the website each time the visitor returns. ChatSecure uses cookies to help ChatSecure identify and track visitors, their usage of ChatSecure website, and their website access preferences. ChatSecure visitors who do not wish to have cookies placed on their computers should set their browsers to refuse cookies before using ChatSecure\u2019s websites, with the drawback that certain features of ChatSecure\u2019s websites may not function properly without the aid of cookies.</p>\n\n<h2 id="analytics--social-sharing-widgets">Analytics &amp; Social Sharing Widgets</h2>\n\n<p>ChatSecure uses Google Analytics on chatsecure.org to help us monitor the number of people who visit the site. We also include social sharing widgets that are bundled with our blogging theme. We recommend using a browser plugin like <a href="http://www.ghostery.com">Ghostery</a> to opt-out.</p>\n\n<h2 id="business-transfers">Business Transfers</h2>\n<p>If ChatSecure, or substantially all of its assets, were acquired, or in the unlikely event that ChatSecure goes out of business or enters bankruptcy, user information would be one of the assets that is transferred or acquired by a third party. You acknowledge that such transfers may occur, and that any acquirer of ChatSecure may continue to use your personal information as set forth in this policy.</p>\n\n<h2 id="privacy-policy-changes">Privacy Policy Changes</h2>\n<p>Although most changes are likely to be minor, ChatSecure may change its Privacy Policy from time to time, and in ChatSecure\u2019s sole discretion. ChatSecure encourages visitors to frequently check this page for any changes to its Privacy Policy. Your continued use of this site after any change in this Privacy Policy will constitute your acceptance of such change.</p>\n\n<h3 id="change-log">Change log:</h3>\n\n<p>January 3, 2014: Initial privacy policy, modeled after Automattic\u2019s.</p>\n\n </section>'} 2017-02-26 16:56:17 [scrapy] DEBUG: Scraped from <200 http://chatsecure.org/privacy/> {'content': u'<section>\n <p>This document is modeled after the <a href="http://automattic.com/privacy/">Creative Commons Privacy Policy</a> from <a href="http://automattic.com">Automattic</a>.</p>\n\n<h2 id="website-visitors">Website Visitors</h2>\n<p>Like most website operators, ChatSecure collects non-personally-identifying information of the sort that web browsers and servers typically make available, such as the browser type, language preference, referring site, and the date and time of each visitor request. ChatSecure\u2019s purpose in collecting non-personally identifying information is to better understand how ChatSecure\u2019s visitors use its website. From time to time, ChatSecure may release non-personally-identifying information in the aggregate, e.g., by publishing a report on trends in the usage of its website.</p>\n\n<p>To protect your privacy, we recommend using a browser plugin to block 3rd party tracking services, such as <a href="http://www.ghostery.com">Ghostery</a>.</p>\n\n<h2 id="mobile-apps">Mobile Apps</h2>\n\n<p>We purposefully do not include any analytics code in our mobile applications to help preserve your privacy. When using ChatSecure to connect to 3rd party chat servers, you are relying on those service\u2019s privacy policies as well. For example, if you use ChatSecure with Google Talk, you should be mindful of <a href="https://www.google.com/intl/en/policies/privacy/">Google\u2019s Privacy Policy</a>.</p>\n\n<p>At this time, the only other data that can be submitted to a 3rd party is our opt-in, anonymized crash report data, provided by the open source crash reporting SDK from <a href="http://hockeyapp.net">HockeyApp</a>.</p>\n\n<h2 id="gathering-of-personally-identifying-information">Gathering of Personally-Identifying Information</h2>\n<p>Certain visitors to ChatSecure\u2019s websites choose to interact with ChatSecure in ways that require ChatSecure to gather personally-identifying information. The amount and type of information that ChatSecure gathers depends on the nature of the interaction. In each case, ChatSecure collects such information only insofar as is necessary or appropriate to fulfill the purpose of the visitor\u2019s interaction with ChatSecure. ChatSecure does not disclose personally-identifying information other than as described below. And visitors can always refuse to supply personally-identifying information, with the caveat that it may prevent them from engaging in certain website-related activities.</p>\n\n<h2 id="aggregated-statistics">Aggregated Statistics</h2>\n<p>ChatSecure may collect statistics about the behavior of visitors to its websites. ChatSecure may display this information publicly or provide it to others. However, ChatSecure does not disclose personally-identifying information other than as described below.</p>\n\n<h2 id="protection-of-certain-personally-identifying-information">Protection of Certain Personally-Identifying Information</h2>\n<p>ChatSecure discloses potentially personally-identifying and personally-identifying information only to those of its employees, contractors and affiliated organizations that (i) need to know that information in order to process it on ChatSecure\u2019s behalf or to provide services available at ChatSecure\u2019s websites, and (ii) that have agreed not to disclose it to others. Some of those employees, contractors and affiliated organizations may be located outside of your home country; by using ChatSecure\u2019s websites, you consent to the transfer of such information to them. ChatSecure will not rent or sell potentially personally-identifying and personally-identifying information to anyone. Other than to its employees, contractors and affiliated organizations, as described above, ChatSecure discloses potentially personally-identifying and personally-identifying information only in response to a subpoena, court order or other governmental request, or when ChatSecure believes in good faith that disclosure is reasonably necessary to protect the property or rights of ChatSecure, third parties or the public at large. If you are a registered user of an ChatSecure website and have supplied your email address, ChatSecure may occasionally send you an email to tell you about new features, solicit your feedback, or just keep you up to date with what\u2019s going on with ChatSecure and our products. We primarily use our various product blogs to communicate this type of information, so we expect to keep this type of email to a minimum. If you send us a request (for example via a support email or via one of our feedback mechanisms), we reserve the right to publish it in order to help us clarify or respond to your request or to help us support other users. ChatSecure takes all measures reasonably necessary to protect against the unauthorized access, use, alteration or destruction of potentially personally-identifying and personally-identifying information.</p>\n\n<h2 id="cookies">Cookies</h2>\n<p>A cookie is a string of information that a website stores on a visitor\u2019s computer, and that the visitor\u2019s browser provides to the website each time the visitor returns. ChatSecure uses cookies to help ChatSecure identify and track visitors, their usage of ChatSecure website, and their website access preferences. ChatSecure visitors who do not wish to have cookies placed on their computers should set their browsers to refuse cookies before using ChatSecure\u2019s websites, with the drawback that certain features of ChatSecure\u2019s websites may not function properly without the aid of cookies.</p>\n\n<h2 id="analytics--social-sharing-widgets">Analytics &amp; Social Sharing Widgets</h2>\n\n<p>ChatSecure uses Google Analytics on chatsecure.org to help us monitor the number of people who visit the site. We also include social sharing widgets that are bundled with our blogging theme. We recommend using a browser plugin like <a href="http://www.ghostery.com">Ghostery</a> to opt-out.</p>\n\n<h2 id="business-transfers">Business Transfers</h2>\n<p>If ChatSecure, or substantially all of its assets, were acquired, or in the unlikely event that ChatSecure goes out of business or enters bankruptcy, user information would be one of the assets that is transferred or acquired by a third party. You acknowledge that such transfers may occur, and that any acquirer of ChatSecure may continue to use your personal information as set forth in this policy.</p>\n\n<h2 id="privacy-policy-changes">Privacy Policy Changes</h2>\n<p>Although most changes are likely to be minor, ChatSecure may change its Privacy Policy from time to time, and in ChatSecure\u2019s sole discretion. ChatSecure encourages visitors to frequently check this page for any changes to its Privacy Policy. Your continued use of this site after any change in this Privacy Policy will constitute your acceptance of such change.</p>\n\n<h3 id="change-log">Change log:</h3>\n\n<p>January 3, 2014: Initial privacy policy, modeled after Automattic\u2019s.</p>\n\n </section>'} Error during info_callback Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 421, in dataReceived self._write(bytes) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 569, in _write sent = self._tlsConnection.send(toSend) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 1255, in send result = _lib.SSL_write(self._ssl, buf, len(buf)) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) --- <exception caught here> --- File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1154, in infoCallback return wrapped(connection, where, ret) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1253, in _identityVerifyingInfoCallback verifyHostname(connection, self._hostnameASCII) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 44, in verify_hostname cert_patterns=extract_ids(connection.get_peer_certificate()), File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 73, in extract_ids ids.append(DNSPattern(n.getComponent().asOctets())) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/_common.py", line 156, in __init__ "Invalid DNS pattern {0!r}.".format(pattern) service_identity.exceptions.CertificateError: Invalid DNS pattern '107.154.106.99'. CRITICAL:twisted:Error during info_callback Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 421, in dataReceived self._write(bytes) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 569, in _write sent = self._tlsConnection.send(toSend) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 1255, in send result = _lib.SSL_write(self._ssl, buf, len(buf)) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) --- <exception caught here> --- File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1154, in infoCallback return wrapped(connection, where, ret) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1253, in _identityVerifyingInfoCallback verifyHostname(connection, self._hostnameASCII) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 44, in verify_hostname cert_patterns=extract_ids(connection.get_peer_certificate()), File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 73, in extract_ids ids.append(DNSPattern(n.getComponent().asOctets())) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/_common.py", line 156, in __init__ "Invalid DNS pattern {0!r}.".format(pattern) service_identity.exceptions.CertificateError: Invalid DNS pattern '107.154.106.99'. 2017-02-26 16:56:17 [twisted] CRITICAL: Error during info_callback Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 421, in dataReceived self._write(bytes) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 569, in _write sent = self._tlsConnection.send(toSend) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 1255, in send result = _lib.SSL_write(self._ssl, buf, len(buf)) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) --- <exception caught here> --- File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1154, in infoCallback return wrapped(connection, where, ret) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1253, in _identityVerifyingInfoCallback verifyHostname(connection, self._hostnameASCII) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 44, in verify_hostname cert_patterns=extract_ids(connection.get_peer_certificate()), File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 73, in extract_ids ids.append(DNSPattern(n.getComponent().asOctets())) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/_common.py", line 156, in __init__ "Invalid DNS pattern {0!r}.".format(pattern) service_identity.exceptions.CertificateError: Invalid DNS pattern '107.154.106.99'. From cffi callback <function infoCallback at 0x3f786e0>: Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1158, in infoCallback connection.get_app_data().failVerification(f) AttributeError: 'NoneType' object has no attribute 'failVerification' Error during info_callback Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 421, in dataReceived self._write(bytes) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 569, in _write sent = self._tlsConnection.send(toSend) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 1255, in send result = _lib.SSL_write(self._ssl, buf, len(buf)) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) --- <exception caught here> --- File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1154, in infoCallback return wrapped(connection, where, ret) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1253, in _identityVerifyingInfoCallback verifyHostname(connection, self._hostnameASCII) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 44, in verify_hostname cert_patterns=extract_ids(connection.get_peer_certificate()), File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 73, in extract_ids ids.append(DNSPattern(n.getComponent().asOctets())) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/_common.py", line 156, in __init__ "Invalid DNS pattern {0!r}.".format(pattern) service_identity.exceptions.CertificateError: Invalid DNS pattern '107.154.106.99'. CRITICAL:twisted:Error during info_callback Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 421, in dataReceived self._write(bytes) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 569, in _write sent = self._tlsConnection.send(toSend) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 1255, in send result = _lib.SSL_write(self._ssl, buf, len(buf)) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) --- <exception caught here> --- File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1154, in infoCallback return wrapped(connection, where, ret) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1253, in _identityVerifyingInfoCallback verifyHostname(connection, self._hostnameASCII) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 44, in verify_hostname cert_patterns=extract_ids(connection.get_peer_certificate()), File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 73, in extract_ids ids.append(DNSPattern(n.getComponent().asOctets())) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/_common.py", line 156, in __init__ "Invalid DNS pattern {0!r}.".format(pattern) service_identity.exceptions.CertificateError: Invalid DNS pattern '107.154.106.99'. 2017-02-26 16:56:17 [twisted] CRITICAL: Error during info_callback Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 421, in dataReceived self._write(bytes) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 569, in _write sent = self._tlsConnection.send(toSend) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 1255, in send result = _lib.SSL_write(self._ssl, buf, len(buf)) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) --- <exception caught here> --- File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1154, in infoCallback return wrapped(connection, where, ret) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1253, in _identityVerifyingInfoCallback verifyHostname(connection, self._hostnameASCII) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 44, in verify_hostname cert_patterns=extract_ids(connection.get_peer_certificate()), File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 73, in extract_ids ids.append(DNSPattern(n.getComponent().asOctets())) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/_common.py", line 156, in __init__ "Invalid DNS pattern {0!r}.".format(pattern) service_identity.exceptions.CertificateError: Invalid DNS pattern '107.154.106.99'. From cffi callback <function infoCallback at 0x3f7e1b8>: Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1158, in infoCallback connection.get_app_data().failVerification(f) AttributeError: 'NoneType' object has no attribute 'failVerification' Error during info_callback Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 421, in dataReceived self._write(bytes) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 569, in _write sent = self._tlsConnection.send(toSend) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 1255, in send result = _lib.SSL_write(self._ssl, buf, len(buf)) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) --- <exception caught here> --- File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1154, in infoCallback return wrapped(connection, where, ret) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1253, in _identityVerifyingInfoCallback verifyHostname(connection, self._hostnameASCII) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 44, in verify_hostname cert_patterns=extract_ids(connection.get_peer_certificate()), File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 73, in extract_ids ids.append(DNSPattern(n.getComponent().asOctets())) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/_common.py", line 156, in __init__ "Invalid DNS pattern {0!r}.".format(pattern) service_identity.exceptions.CertificateError: Invalid DNS pattern '23.56.119.187'. CRITICAL:twisted:Error during info_callback Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 421, in dataReceived self._write(bytes) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 569, in _write sent = self._tlsConnection.send(toSend) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 1255, in send result = _lib.SSL_write(self._ssl, buf, len(buf)) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) --- <exception caught here> --- File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1154, in infoCallback return wrapped(connection, where, ret) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1253, in _identityVerifyingInfoCallback verifyHostname(connection, self._hostnameASCII) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 44, in verify_hostname cert_patterns=extract_ids(connection.get_peer_certificate()), File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 73, in extract_ids ids.append(DNSPattern(n.getComponent().asOctets())) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/_common.py", line 156, in __init__ "Invalid DNS pattern {0!r}.".format(pattern) service_identity.exceptions.CertificateError: Invalid DNS pattern '23.56.119.187'. 2017-02-26 16:56:17 [twisted] CRITICAL: Error during info_callback Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 421, in dataReceived self._write(bytes) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 569, in _write sent = self._tlsConnection.send(toSend) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 1255, in send result = _lib.SSL_write(self._ssl, buf, len(buf)) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) --- <exception caught here> --- File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1154, in infoCallback return wrapped(connection, where, ret) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1253, in _identityVerifyingInfoCallback verifyHostname(connection, self._hostnameASCII) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 44, in verify_hostname cert_patterns=extract_ids(connection.get_peer_certificate()), File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 73, in extract_ids ids.append(DNSPattern(n.getComponent().asOctets())) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/_common.py", line 156, in __init__ "Invalid DNS pattern {0!r}.".format(pattern) service_identity.exceptions.CertificateError: Invalid DNS pattern '23.56.119.187'. From cffi callback <function infoCallback at 0x3f86578>: Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1158, in infoCallback connection.get_app_data().failVerification(f) AttributeError: 'NoneType' object has no attribute 'failVerification' INFO:scrapy.core.engine:Closing spider (finished) 2017-02-26 16:56:17 [scrapy] INFO: Closing spider (finished) DEBUG:page_watcher_scraper.pipelines:closing policy file 2017-02-26 16:56:17 [page_watcher_scraper.pipelines] DEBUG: closing policy file INFO:scrapy.statscollectors:Dumping Scrapy stats: {'downloader/request_bytes': 221, 'downloader/request_count': 1, 'downloader/request_method_count/GET': 1, 'downloader/response_bytes': 12935, 'downloader/response_count': 1, 'downloader/response_status_count/200': 1, 'finish_reason': 'finished', 'finish_time': datetime.datetime(2017, 2, 26, 16, 56, 17, 178376), 'item_scraped_count': 1, 'log_count/CRITICAL': 4, 'log_count/DEBUG': 32, 'log_count/INFO': 19, 'response_received_count': 1, 'scheduler/dequeued': 1, 'scheduler/dequeued/memory': 1, 'scheduler/enqueued': 1, 'scheduler/enqueued/memory': 1, 'start_time': datetime.datetime(2017, 2, 26, 16, 56, 16, 430176)} 2017-02-26 16:56:17 [scrapy] INFO: Dumping Scrapy stats: {'downloader/request_bytes': 221, 'downloader/request_count': 1, 'downloader/request_method_count/GET': 1, 'downloader/response_bytes': 12935, 'downloader/response_count': 1, 'downloader/response_status_count/200': 1, 'finish_reason': 'finished', 'finish_time': datetime.datetime(2017, 2, 26, 16, 56, 17, 178376), 'item_scraped_count': 1, 'log_count/CRITICAL': 4, 'log_count/DEBUG': 32, 'log_count/INFO': 19, 'response_received_count': 1, 'scheduler/dequeued': 1, 'scheduler/dequeued/memory': 1, 'scheduler/enqueued': 1, 'scheduler/enqueued/memory': 1, 'start_time': datetime.datetime(2017, 2, 26, 16, 56, 16, 430176)} INFO:scrapy.core.engine:Spider closed (finished) 2017-02-26 16:56:17 [scrapy] INFO: Spider closed (finished) DEBUG:scrapy.core.engine:Crawled (200) <GET https://www.whatsapp.com/legal/> (referer: None) 2017-02-26 16:56:17 [scrapy] DEBUG: Crawled (200) <GET https://www.whatsapp.com/legal/> (referer: None) Error during info_callback Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 421, in dataReceived self._write(bytes) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 569, in _write sent = self._tlsConnection.send(toSend) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 1255, in send result = _lib.SSL_write(self._ssl, buf, len(buf)) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) --- <exception caught here> --- File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1154, in infoCallback return wrapped(connection, where, ret) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1253, in _identityVerifyingInfoCallback verifyHostname(connection, self._hostnameASCII) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 44, in verify_hostname cert_patterns=extract_ids(connection.get_peer_certificate()), File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 73, in extract_ids ids.append(DNSPattern(n.getComponent().asOctets())) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/_common.py", line 156, in __init__ "Invalid DNS pattern {0!r}.".format(pattern) service_identity.exceptions.CertificateError: Invalid DNS pattern '96.126.117.251'. CRITICAL:twisted:Error during info_callback Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 421, in dataReceived self._write(bytes) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 569, in _write sent = self._tlsConnection.send(toSend) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 1255, in send result = _lib.SSL_write(self._ssl, buf, len(buf)) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) --- <exception caught here> --- File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1154, in infoCallback return wrapped(connection, where, ret) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1253, in _identityVerifyingInfoCallback verifyHostname(connection, self._hostnameASCII) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 44, in verify_hostname cert_patterns=extract_ids(connection.get_peer_certificate()), File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 73, in extract_ids ids.append(DNSPattern(n.getComponent().asOctets())) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/_common.py", line 156, in __init__ "Invalid DNS pattern {0!r}.".format(pattern) service_identity.exceptions.CertificateError: Invalid DNS pattern '96.126.117.251'. 2017-02-26 16:56:17 [twisted] CRITICAL: Error during info_callback Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 421, in dataReceived self._write(bytes) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 569, in _write sent = self._tlsConnection.send(toSend) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 1255, in send result = _lib.SSL_write(self._ssl, buf, len(buf)) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) --- <exception caught here> --- File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1154, in infoCallback return wrapped(connection, where, ret) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1253, in _identityVerifyingInfoCallback verifyHostname(connection, self._hostnameASCII) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 44, in verify_hostname cert_patterns=extract_ids(connection.get_peer_certificate()), File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 73, in extract_ids ids.append(DNSPattern(n.getComponent().asOctets())) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/_common.py", line 156, in __init__ "Invalid DNS pattern {0!r}.".format(pattern) service_identity.exceptions.CertificateError: Invalid DNS pattern '96.126.117.251'. From cffi callback <function infoCallback at 0x3f8ce60>: Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1158, in infoCallback connection.get_app_data().failVerification(f) AttributeError: 'NoneType' object has no attribute 'failVerification' DEBUG:policies:in handle response 2017-02-26 16:56:17 [policies] DEBUG: in handle response DEBUG:policies:wroten log ok /app/log/2017-02-26T16-56-16_ok_url.log 2017-02-26 16:56:17 [policies] DEBUG: wroten log ok /app/log/2017-02-26T16-56-16_ok_url.log DEBUG:page_watcher_scraper.util:{'item': 'www.whatsapp.com_legal_', 'name': 'policies', 'time': '2017-02-26T16-56-17'} 2017-02-26 16:56:17 [page_watcher_scraper.util] DEBUG: {'item': 'www.whatsapp.com_legal_', 'name': 'policies', 'time': '2017-02-26T16-56-17'} DEBUG:page_watcher_scraper.util:saving html /app/html/2017-02-26T16-56-17-policies-www.whatsapp.com_legal_.html 2017-02-26 16:56:17 [page_watcher_scraper.util] DEBUG: saving html /app/html/2017-02-26T16-56-17-policies-www.whatsapp.com_legal_.html DEBUG:scrapy.core.scraper:Scraped from <200 https://www.whatsapp.com/legal/> {'content': None} 2017-02-26 16:56:17 [scrapy] DEBUG: Scraped from <200 https://www.whatsapp.com/legal/> {'content': None} INFO:scrapy.core.engine:Closing spider (finished) 2017-02-26 16:56:17 [scrapy] INFO: Closing spider (finished) DEBUG:page_watcher_scraper.pipelines:closing policy file 2017-02-26 16:56:17 [page_watcher_scraper.pipelines] DEBUG: closing policy file INFO:scrapy.statscollectors:Dumping Scrapy stats: {'downloader/request_bytes': 221, 'downloader/request_count': 1, 'downloader/request_method_count/GET': 1, 'downloader/response_bytes': 95520, 'downloader/response_count': 1, 'downloader/response_status_count/200': 1, 'finish_reason': 'finished', 'finish_time': datetime.datetime(2017, 2, 26, 16, 56, 17, 300805), 'item_scraped_count': 1, 'log_count/CRITICAL': 5, 'log_count/DEBUG': 32, 'log_count/INFO': 16, 'response_received_count': 1, 'scheduler/dequeued': 1, 'scheduler/dequeued/memory': 1, 'scheduler/enqueued': 1, 'scheduler/enqueued/memory': 1, 'start_time': datetime.datetime(2017, 2, 26, 16, 56, 16, 440510)} 2017-02-26 16:56:17 [scrapy] INFO: Dumping Scrapy stats: {'downloader/request_bytes': 221, 'downloader/request_count': 1, 'downloader/request_method_count/GET': 1, 'downloader/response_bytes': 95520, 'downloader/response_count': 1, 'downloader/response_status_count/200': 1, 'finish_reason': 'finished', 'finish_time': datetime.datetime(2017, 2, 26, 16, 56, 17, 300805), 'item_scraped_count': 1, 'log_count/CRITICAL': 5, 'log_count/DEBUG': 32, 'log_count/INFO': 16, 'response_received_count': 1, 'scheduler/dequeued': 1, 'scheduler/dequeued/memory': 1, 'scheduler/enqueued': 1, 'scheduler/enqueued/memory': 1, 'start_time': datetime.datetime(2017, 2, 26, 16, 56, 16, 440510)} INFO:scrapy.core.engine:Spider closed (finished) 2017-02-26 16:56:17 [scrapy] INFO: Spider closed (finished) DEBUG:scrapy.core.engine:Crawled (200) <GET https://www.whispersystems.org/signal/privacy/> (referer: None) 2017-02-26 16:56:17 [scrapy] DEBUG: Crawled (200) <GET https://www.whispersystems.org/signal/privacy/> (referer: None) DEBUG:policies:in handle response 2017-02-26 16:56:17 [policies] DEBUG: in handle response DEBUG:policies:wroten log ok /app/log/2017-02-26T16-56-16_ok_url.log 2017-02-26 16:56:17 [policies] DEBUG: wroten log ok /app/log/2017-02-26T16-56-16_ok_url.log DEBUG:page_watcher_scraper.util:{'item': 'www.whispersystems.org_signal_privacy_', 'name': 'policies', 'time': '2017-02-26T16-56-17'} 2017-02-26 16:56:17 [page_watcher_scraper.util] DEBUG: {'item': 'www.whispersystems.org_signal_privacy_', 'name': 'policies', 'time': '2017-02-26T16-56-17'} DEBUG:page_watcher_scraper.util:saving html /app/html/2017-02-26T16-56-17-policies-www.whispersystems.org_signal_privacy_.html 2017-02-26 16:56:17 [page_watcher_scraper.util] DEBUG: saving html /app/html/2017-02-26T16-56-17-policies-www.whispersystems.org_signal_privacy_.html DEBUG:page_watcher_scraper.pipelines:writing policy to file /app/page-watcher-data/whispersystems/signal/privacy_policy.txt 2017-02-26 16:56:17 [page_watcher_scraper.pipelines] DEBUG: writing policy to file /app/page-watcher-data/whispersystems/signal/privacy_policy.txt DEBUG:scrapy.core.scraper:Scraped from <200 https://www.whispersystems.org/signal/privacy/> {'content': u'<div class="col-lg-8 col-lg-offset-2">\n\t<h1>Privacy Policy</h1>\n\n<p>Signal provides end-to-end encrypted calling and messaging. We cannot decrypt or otherwise access the content of a call or a message.</p>\n\n<h2>Information We Have</h2>\n\n<p>Certain information (e.g. a recipient\'s identifier, an encrypted message body, etc.) is transmitted to us solely for the\npurpose of placing calls or transmitting messages. Unless otherwise stated below, this information is only kept as long\nas necessary to place each call or transmit each message, and is not used for any other purpose.</p>\n\n<h3>1. Information we store</h3>\n\n<ul>\n<li><p>The phone number or identifier you register with.</p></li>\n<li><p>Randomly generated authentication tokens, keys, push tokens, etc. necessary for setting up a call or transmitting a message.</p></li>\n<li><p>Profile information (e.g. an avatar, etc) you submit.</p></li>\n</ul>\n\n<h3>2. Transient information</h3>\n\n<ul>\n<li><p>IP addresses may be kept in memory for rate limiting or to prevent abuse.</p></li>\n<li><p>Information from the contacts on your device may be cryptographically hashed and transmitted to the server in order to <a href="/blog/contact-discovery">determine which of your contacts are registered</a>.</p></li>\n</ul>\n\n<h2>Information We May Share</h2>\n\n<p>We do not share your information with companies, organizations, and individuals outside of OWS unless\none of the following circumstances applies:</p>\n\n<ul>\n<li><p>With your consent.</p></li>\n<li><p>Through normal communication with a federated server operated by another entity. Some Signal users might be registered\nwith other providers (e.g. CyanogenMOD), which requires passing messages, synchronizing views of registered users, etc.</p></li>\n<li><p>When legally required.</p></li>\n</ul>\n\n<p>We will share the information we have with entities outside of OWS if we have a good faith belief that access, use, preservation, or disclosure of the information is necessary to:</p>\n\n<ul>\n<li>meet any applicable law, regulation, legal process or enforceable governmental request.</li>\n<li>enforce applicable Terms of Service, including investigation of potential violations.</li>\n<li>detect, prevent, or otherwise address fraud, security, or technical issues.</li>\n<li>protect against harm to the rights, property, or safety of OWS, our users, or the public as required or permitted by law.</li>\n</ul>\n\n<p>We will update this privacy policy as needed so that it is current, accurate, and as clear as possible.</p>\n\n </div>'} 2017-02-26 16:56:17 [scrapy] DEBUG: Scraped from <200 https://www.whispersystems.org/signal/privacy/> {'content': u'<div class="col-lg-8 col-lg-offset-2">\n\t<h1>Privacy Policy</h1>\n\n<p>Signal provides end-to-end encrypted calling and messaging. We cannot decrypt or otherwise access the content of a call or a message.</p>\n\n<h2>Information We Have</h2>\n\n<p>Certain information (e.g. a recipient\'s identifier, an encrypted message body, etc.) is transmitted to us solely for the\npurpose of placing calls or transmitting messages. Unless otherwise stated below, this information is only kept as long\nas necessary to place each call or transmit each message, and is not used for any other purpose.</p>\n\n<h3>1. Information we store</h3>\n\n<ul>\n<li><p>The phone number or identifier you register with.</p></li>\n<li><p>Randomly generated authentication tokens, keys, push tokens, etc. necessary for setting up a call or transmitting a message.</p></li>\n<li><p>Profile information (e.g. an avatar, etc) you submit.</p></li>\n</ul>\n\n<h3>2. Transient information</h3>\n\n<ul>\n<li><p>IP addresses may be kept in memory for rate limiting or to prevent abuse.</p></li>\n<li><p>Information from the contacts on your device may be cryptographically hashed and transmitted to the server in order to <a href="/blog/contact-discovery">determine which of your contacts are registered</a>.</p></li>\n</ul>\n\n<h2>Information We May Share</h2>\n\n<p>We do not share your information with companies, organizations, and individuals outside of OWS unless\none of the following circumstances applies:</p>\n\n<ul>\n<li><p>With your consent.</p></li>\n<li><p>Through normal communication with a federated server operated by another entity. Some Signal users might be registered\nwith other providers (e.g. CyanogenMOD), which requires passing messages, synchronizing views of registered users, etc.</p></li>\n<li><p>When legally required.</p></li>\n</ul>\n\n<p>We will share the information we have with entities outside of OWS if we have a good faith belief that access, use, preservation, or disclosure of the information is necessary to:</p>\n\n<ul>\n<li>meet any applicable law, regulation, legal process or enforceable governmental request.</li>\n<li>enforce applicable Terms of Service, including investigation of potential violations.</li>\n<li>detect, prevent, or otherwise address fraud, security, or technical issues.</li>\n<li>protect against harm to the rights, property, or safety of OWS, our users, or the public as required or permitted by law.</li>\n</ul>\n\n<p>We will update this privacy policy as needed so that it is current, accurate, and as clear as possible.</p>\n\n </div>'} INFO:scrapy.core.engine:Closing spider (finished) 2017-02-26 16:56:17 [scrapy] INFO: Closing spider (finished) DEBUG:page_watcher_scraper.pipelines:closing policy file 2017-02-26 16:56:17 [page_watcher_scraper.pipelines] DEBUG: closing policy file INFO:scrapy.statscollectors:Dumping Scrapy stats: {'downloader/request_bytes': 236, 'downloader/request_count': 1, 'downloader/request_method_count/GET': 1, 'downloader/response_bytes': 8540, 'downloader/response_count': 1, 'downloader/response_status_count/200': 1, 'finish_reason': 'finished', 'finish_time': datetime.datetime(2017, 2, 26, 16, 56, 17, 431759), 'item_scraped_count': 1, 'log_count/CRITICAL': 5, 'log_count/DEBUG': 33, 'log_count/INFO': 13, 'response_received_count': 1, 'scheduler/dequeued': 1, 'scheduler/dequeued/memory': 1, 'scheduler/enqueued': 1, 'scheduler/enqueued/memory': 1, 'start_time': datetime.datetime(2017, 2, 26, 16, 56, 16, 452934)} 2017-02-26 16:56:17 [scrapy] INFO: Dumping Scrapy stats: {'downloader/request_bytes': 236, 'downloader/request_count': 1, 'downloader/request_method_count/GET': 1, 'downloader/response_bytes': 8540, 'downloader/response_count': 1, 'downloader/response_status_count/200': 1, 'finish_reason': 'finished', 'finish_time': datetime.datetime(2017, 2, 26, 16, 56, 17, 431759), 'item_scraped_count': 1, 'log_count/CRITICAL': 5, 'log_count/DEBUG': 33, 'log_count/INFO': 13, 'response_received_count': 1, 'scheduler/dequeued': 1, 'scheduler/dequeued/memory': 1, 'scheduler/enqueued': 1, 'scheduler/enqueued/memory': 1, 'start_time': datetime.datetime(2017, 2, 26, 16, 56, 16, 452934)} INFO:scrapy.core.engine:Spider closed (finished) 2017-02-26 16:56:17 [scrapy] INFO: Spider closed (finished) DEBUG:scrapy.core.engine:Crawled (200) <GET https://www.t-mobile.com/company/website/privacypolicy.aspx> (referer: None) 2017-02-26 16:56:17 [scrapy] DEBUG: Crawled (200) <GET https://www.t-mobile.com/company/website/privacypolicy.aspx> (referer: None) DEBUG:scrapy.core.engine:Crawled (200) <GET https://www.t-mobile.com/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditions&amp;print=true> (referer: None) 2017-02-26 16:56:17 [scrapy] DEBUG: Crawled (200) <GET https://www.t-mobile.com/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditions&amp;print=true> (referer: None) DEBUG:policies:in handle response 2017-02-26 16:56:17 [policies] DEBUG: in handle response DEBUG:policies:wroten log ok /app/log/2017-02-26T16-56-16_ok_url.log 2017-02-26 16:56:17 [policies] DEBUG: wroten log ok /app/log/2017-02-26T16-56-16_ok_url.log DEBUG:page_watcher_scraper.util:{'item': 'www.t-mobile.com_company_website_privacypolicy.aspx', 'name': 'policies', 'time': '2017-02-26T16-56-17'} 2017-02-26 16:56:17 [page_watcher_scraper.util] DEBUG: {'item': 'www.t-mobile.com_company_website_privacypolicy.aspx', 'name': 'policies', 'time': '2017-02-26T16-56-17'} DEBUG:page_watcher_scraper.util:saving html /app/html/2017-02-26T16-56-17-policies-www.t-mobile.com_company_website_privacypolicy.aspx.html 2017-02-26 16:56:17 [page_watcher_scraper.util] DEBUG: saving html /app/html/2017-02-26T16-56-17-policies-www.t-mobile.com_company_website_privacypolicy.aspx.html DEBUG:page_watcher_scraper.pipelines:writing policy to file /app/page-watcher-data/t-mobile/gsm/privacy_policy.txt 2017-02-26 16:56:17 [page_watcher_scraper.pipelines] DEBUG: writing policy to file /app/page-watcher-data/t-mobile/gsm/privacy_policy.txt DEBUG:scrapy.core.scraper:Scraped from <200 https://www.t-mobile.com/company/website/privacypolicy.aspx> {'content': u'<div class="faq" style="MARGIN-TOP: 50px">\n <a id="fullpolicy" name="fullpolicy"></a>\n\n <div style="FONT-WEIGHT: bold">\n <h3>T-Mobile Privacy Policy</h3>\n </div>\n December 31, 2016\n <br>\n <a class="primary" href="javascript:var%20popupwin=this.window.open(\'http://es.t-mobile.com/company/website/privacypolicy.aspx?WT.z_unav=ftr__privacypolicy\',665,%22height=600,width=800,screenX=800,screenY=600,left=10,top=10,toolbar=no,location=no,menubar=no,status=no,resizable,scrollbars%22);popupwin.focus();">Please click here for Spanish version of the T-Mobile Privacy Policy</a>\n <br>\n <a class="primary" href="/company/website/privacypolicy.aspx#policyhighlights">Please click here for the T-Mobile Privacy Policy Highlights</a>\n <br>\n <br>\n\n\n <p>This Privacy Policy ("Policy") describes how information about you is collected, used, and disclosed by T-Mobile USA, Inc. ("T-Mobile") and provides other important privacy information, describes when and how we may change this Policy, and tells you how to contact us with any questions or comments.</p>\n\n <br>\n <br>\n\n\n <div class="faqitem">\n <div class="header">\n <a class="icon" id="collectionuse " href="#top" name="collectionuse">\n <img title="Up" height="14" src="https://s.tmocache.com/images/arrowup.gif" width="14" border="0">top</a><b>WHAT TYPES OF INFORMATION WE COLLECT ABOUT YOU</b>\n </div>\n\n <p>We collect information about you and your associated device(s) when you use our products or services or otherwise interact with us or with third-party services through our products and services. Examples of the types of information we collect include:</p>\n <strong>Personal Information</strong>\n\n <p>"Personal Information" means information that we directly associate with a specific person or entity (for example, name; addresses; telephone numbers; email address; Social Security Number; call records; wireless device location). Personal information does not include "de-identified,\x94 "anonymous," or "aggregate" information \x96 which are not associated with a specific person or entity.</p>\n <strong>Customer Proprietary Network Information (CPNI)</strong>\n\n <p>Customer Proprietary Network Information, or "CPNI", is a subset of Personal Information that is generated in connection with the telecommunications services we provide to you. CPNI includes, for example, call details, call location information, and certain information about your rate plans and features. CPNI does not include your name, address, and phone number.</p>\n\n <p>For more information see <a href="/Company/PrivacyResources.aspx?tp=Abt_Tab_CPNI">Privacy Resources/Customer Proprietary Network Information</a></p>\n <strong>Credit and Financial Information</strong>\n\n <p>We collect information about your credit card or banking information, Social Security Number, and credit history for account opening, management and billing and collection purposes. Financial information we collect is governed by <a href="https://www.t-mobile.com/pdf/T-Mobile-Financial-Privacy-Policy_EN.pdf%20" target="_blank">T-Mobile\x92s Financial Privacy Policy</a></p>\n <strong>Network and Device Information</strong>\n\n <p>We may collect information about your use of our network (or other carriers\x92 networks when roaming domestically and internationally) and the device(s) associated with your account, network data related to WiFi usage and device, and performance information, as well as data relating to your use of our website, applications and other products and services.</p>\n\n <br>\n <strong>Location Data</strong>\n\n <p>We may collect your device\'s location whenever it is turned on (subject to coverage limitations).</p>\n <strong>Performance and Diagnostic Data</strong>\n\n <p>We may collect performance and diagnostic data about your use of our network, networks you roam on, WiFi services or your device. For example, we may collect information about the performance of the device, signal strength, dropped calls, data failures, battery strength and other device or network performance issues. We may also collect information about applications on your device, the fact that an application has been added, when an application is launched or fails to launch, and length of time an application has been running.</p>\n\n <strong>Telematics</strong>\n <p>If you are a customer of the T-Mobile SyncUp connected car service, we, and our application provider, collect data from the SyncUp device in your car. This data includes driver behavior information such as acceleration and braking, speed, and RPM. The device also reports vehicle location via GPS and can report on common vehicle issues called Diagnostic Trouble Codes (DTC).</p>\n\n <strong>Video Data</strong>\n\n <p>When you use a T-Mobile video application, for example T-Mobile TV, on your device, we may collect information about the programs you watch to determine customer viewing habits so that we can tailor video selections to you or our customers.</p>\n <strong>Back Up and Cloud Services</strong>\n\n <p>Some devices may automatically upload to T-Mobile network servers information you have stored on the device and/or SIM card in order to facilitate specific functions. For instance, some devices may back-up your address book, photo album, or diagnostic data. You may choose to disable such uploads, but this may affect functionality of the device or your services. We may also provide you the ability to upload other information from your device to T-Mobile or third-party network servers. For instance, you may have the option to upload pictures, text messages, recordings, calendars, tasks, or notes.</p>\n <strong>Collection of Information About Children</strong>\n\n <p>We do not knowingly solicit children to purchase our services or products. If, however, you authorize a child to use our services or products by providing them a device associated with your account, any information associated with such use will be treated as your information in accordance with this Policy. If you are the primary account holder, you will have the ability to set the marketing preferences for any other lines on your account, including those for any children to whom you provide a device.</p>\n\n <p>Our websites are not designed to attract children under the age of 13 and we do not intentionally or knowingly collect Personal Information on our websites from anyone under the age of 13. We encourage parents to be involved in the online activities (including wireless Internet browsing) of their children to ensure that no information is collected from a child without parental permission.</p>\n\n <br>\n </div>\n\n <div class="faqitem">\n <div class="header">\n <a class="icon" id="A1" href="#top" name="collectionuse">\n <img title="Up" height="14" src="https://s.tmocache.com/images/arrowup.gif" width="14" border="0">top</a><b>HOW INFORMATION ABOUT YOU IS COLLECTED</b>\n </div>\n\n <p>T-Mobile collects information about you in three primary ways:</p>\n <strong>Information You Provide</strong>\n\n <p>We collect information that you provide to us when you apply for, purchase, or use our products or services, or otherwise communicate with us.</p>\n For example, some of the ways you may provide information to us include:\n\n <ul>\n <li><p>When you sign up for our voice or data services or purchase other products or services, we may collect personal contact, billing, and credit information.</p></li>\n\n <li><p>When you establish or modify an online account, we may collect user identification information, passwords, and/or security question responses that you will use for future sign-on.</p></li>\n\n <li><p>When you interact with our customer service representatives, enter information on our websites, submit survey responses, or pay for services, we may also collect Personal Information and other information. We may monitor and record phone calls, e-mails, live chats, or other communications between you, your device, and our customer service representatives or other employees or representatives.</p></li>\n\n <li><p>When you use our services on a phone provided to you by an account holder.</p></li>\n </ul>\n <strong>Information We Collect Automatically</strong>\n\n <p>We automatically collect a variety of information associated with your use of your device (on our network, when roaming, or in WiFi mode) and our products and services, some of which may be associated with you or another user on your account.</p>\n\n <br>\n For example some of the ways we may automatically collect information include:\n\n <ul>\n <li><p>Our systems capture details about the type and location of wireless device(s) you use, when the device is turned on, calls and text messages you send and receive (but we do not retain the content of those calls or messages after delivery), and other data services you use.</p></li>\n\n <li><p>We may also gather information about the performance of your device and our network. Some examples of the types of data collected include: the applications on the device, signal strength, dropped calls, data failures, and other device or network performance issues.</p></li>\n\n <li>\n <strong>Cookies, Web Beacons, and Similar Technologies</strong>\n\n <p>We may use, or we may engage third-parties to use on our behalf, cookies (small data text files placed on your computer or device) or similar technologies to identify your computer or device and record your preferences and other data so that our websites can personalize your visit(s), see which areas and features of our websites are popular, and improve our websites and your experience.</p>\n\n <p>We may also use web beacons (small graphic images on a web page or an HTML e-mail) to monitor interaction with our websites or e-mails. Web beacons are generally invisible because they are very small (only 1-by-1 pixel) and the same color as the background of the web page or e-mail message.</p>\n\n <p>The information we receive through cookies, web beacons and similar technologies may enable us to recognize users across devices, such as smartphones, computers, tablets or related browsers. Depending upon your device or computer, you may be able to set your browser(s) to reject cookies or delete cookies, but that may result in the loss of some functionality on our websites. If we combine or link cookie or web beacon information with Personal Information, we will treat the combined or linked information as Personal Information under this Policy.</p>\n </li>\n\n <li style="LIST-STYLE-TYPE: none">\n <br>\n </li>\n\n <li>\n <strong>Web Browsing Activity</strong>\n\n <p><i>Our Websites.</i> When accessing our websites, mobile websites and related applications and widgets designed for your device or web-based experience, we automatically collect certain information about your device and your visit, such as your IP address, browser type, date and time, the web page you visited before visiting our website, your activities and purchases on our websites, and other analytical information associated with the sites.</p>\n\n <p><i>Other Websites.</i> When your device\x92s web browser utilizes our data services to access websites other than our own, we automatically capture information associated with your browsing activities, and measure and monitor network and Internet connection performance, throughput, latency, and similar network data.</p>\n\n <p><i>Do Not Track Policy.</i> Some browsers have incorporated "Do Not Track" features. Most of these features, when turned on, send a signal or preference to the websites you visit indicating that you do not wish to be tracked. Those sites (or the third party content on those sites) may continue to engage in activities you might view as tracking even though you have expressed this preference, depending on the sites\x92 privacy practices. Because there is not yet a common understanding of how to interpret the DNT signal, we do not currently respond to the browser DNT signals when you use our services and products or interact with our websites or online services. We do allow you to exercise choice regarding the collection of information by third parties about your online activities over time and across third-party websites or online services for online interest based advertising purposes and to opt out of our interest-based advertising on your device, as described <a href="#choicesaboutadvertising">below</a>.</p>\n </li>\n\n <li>\n <strong>Voice Controlled Applications</strong>\n\n <p>If you use a voice-controlled application, that application may collect and record your requests and other information from you and your phone.</p>\n </li>\n <li>\n <strong>Retail Beacons</strong>\n <p>We may use beacon devices in our retail locations that collect data about your device. These programs use signals from smart devices (like mobile phones and tablets) to track movement and wait times. Retail beacons collect a unique identifier that your device routinely transmits (e.g., a MAC address) and coverts it to an identifier unique to T-Mobile. In some cases, we will use identifiers that are already routinely collected by the T-Mobile network in order to provide you with wireless service. We use aggregated data in order to understand general traffic trends in our stores. This helps us to better service our customers.</p>\n </li>\n </ul>\n <strong>Information From Other Sources</strong>\n\n <p>We may also obtain information about you from other sources. For example, we may receive credit information from third-party sources before initiating your service, or background information in connection with employment opportunities. We may also obtain updated address information from our shippers or other vendors. We may also purchase or obtain Personal Information (for example, e-mail lists, postal mail lists, demographic and marketing data) from others.</p>\n\n <br>\n </div>\n\n <div class="faqitem">\n <div class="header">\n <a class="icon" id="A2" href="#top" name="collectionuse">\n <img title="Up" height="14" src="https://s.tmocache.com/images/arrowup.gif" width="14" border="0">top</a><b>HOW WE USE INFORMATION WE COLLECT ABOUT YOU</b>\n </div>\n\n <p>We use the information we collect for a variety of business purposes, such as:</p>\n\n <ul>\n <li>To route your calls or message or otherwise provide you with service;</li>\n\n <li>To provide and bill for products and services you purchase and charge to your account;</li>\n\n <li>To deliver and confirm products and services you obtain from us;</li>\n\n <li>To verify your identity and maintain a record of your transactions and interactions with us;</li>\n\n <li>To provide customer and technical services to you;</li>\n\n <li>To create, modify, improve, enhance, remove or fix our network, products and services, and their performance;</li>\n\n <li>To identify and suggest products or services that might interest you;</li>\n\n <li>To make internal business decisions about current and future product and service offerings;</li>\n\n <li>To provide you customized user experiences, including personalized product and service offerings;</li>\n\n <li>To protect our rights, interests, safety and property and that of our customers, service providers and other third parties; and</li>\n\n <li>To co mply with law or as required for legal purposes.</li>\n </ul>\n\n <br>\n <strong>Fraud Prevention</strong>\n\n <p>We may use Personal Information, including voice print recordings, account information (such as purchase patterns) and device information for investigations or prevention of fraud or network abuse. We provide fraud prevention services to banks or other third parties. As part of this service, we may verify your phone number to help those third parties prevent your personal information from being used for fraudulent purposes. We also may provide the information you report as spam to 7726 to a third party to prevent fraud or network abuse, and we may share such information with government agencies and others that work to combat spam and prevent fraudulent, deceptive, and unfair practices.</p>\n <strong>Information Collected from Cookies</strong>\n\n <p>We may also use information collected from cookies or other similar technologies to improve our websites, make recommendations, and complete transactions you request.</p>\n <strong>Marketing</strong>\n\n <p>We may use information we collect to contact you about T-Mobile or third-party products, services, and offers that we believe you may find of interest. We may contact you by telephone, postal mail, e-mail, or other methods. You may opt-out of receiving marketing communications from us at any time as outlined below in <a href="#infochoices">Choices Regarding Use of Your Information</a>.</p>\n <strong>Directories</strong>\n\n <p>We do not publish directories of our customers\x92 wireless numbers; nor will we provide or make such numbers available to third-parties for listing in their public directories, without the customer\x92s prior consent.</p>\n <strong>Performance, Diagnostics &amp; Management</strong>\n\n <p>We collect information about devices, our network and WiFi usage to perform diagnostic analyses and understand how your device is performing overall. Diagnostic data helps us troubleshoot technical issues related to your device\x92s performance such as battery life, dropped calls, processing speed, device memory, service coverage, and network and WiFi signal strength that you and other customers may experience. If you are using a device in WiFi mode, we may collect information about that usage, such as the routing address and IP address. We also may use diagnostic data to identify and recommend products and services.</p>\n <strong>Location-Based Services</strong>\n\n <p>We use location information to route wireless communications and to provide 911 service, which allows emergency services to locate your general location. We may disclose, without your consent, the approximate location of a wireless device to a governmental entity or law enforcement authority when we are served with lawful process or reasonably believe there is an emergency involving risk of death or serious physical harm.</p>\n\n <p>Depending on your device, you may also be able to obtain a wide array of services based on the location of your device (for example, driving directions, enhanced 411 Directory Assistance, Find My Device, or search results, etc.). These data services, known as Location-Based Services ("LBS") are made available by us and others, usually via applications. These services use various location technologies and acquire location data from various sources.</p>\n\n <p>These applications and services use various location technologies (including Global Positioning Satellite ("GPS"), Assisted GPS ("AGPS"), cell ID and enhanced cell ID technologies) to identify the approximate location of a device, which is then used in conjunction with the application to enhance the user\x92s experience (for example, to provide driving directions, to provide enhanced 411 Directory Assistance, or search results, etc.)</p>\n\n <p>LBS may, or may not, involve any interaction with or dependency on our network, and location-based services may or may not look to our network to obtain location data. Where we allow third parties the capability of accessing data about your location that is derived from our network, we require those third parties to observe specific privacy and security protections consistent with this policy.</p>\n\n <p>It is important that you understand the location capabilities and settings of your device, and that you carefully read and understand the terms under which these services are provided \x96 whether by us or another entity.</p>\n\n <p>You should carefully review the privacy policies and other terms of third-parties with whom you have authorized the sharing of your location information, and you should consider the risks involved in disclosing your location information to other people.</p>\n\n <p>Where we provide a location-based service, you will receive notice of the location features of the service and collection of location data is with your consent. You will be provided options for managing when and how such information should be shared (except in the case of certain parental controls or similar services associated with enterprise or multi-line accounts \x96 for example, T-Mobile\x92s FamilyWhereTM services \x96 which may be managed solely by the primary account holder or their designee, but always with notice to the end-user). T-Mobile follows the CTIA\x92s Best Practices Guidelines for Location-Based Services, which are available <a href="http://www.ctia.org/policy-initiatives/voluntary-guidelines/best-practices-and-guidelines-for-location-based-services">here</a>.</p>\n <br>\n <p>For more information on location services, see <a href="/Company/PrivacyResources.aspx?tp=Abt_Tab_LocationServices">Privacy Resources/Location Services</a></p>\n <br>\n\n <strong>Telematics</strong>\n <p>Data from our SyncUp connected car service is used to provide you with that vehicle monitoring service, to enable the functions of the SyncUp associated Motion app, and to enable WiFi connectivity in your car. In addition, your data may be shared with our application provider in order to enable third-party services that use your personal data, though in such cases no third-party will be granted access to data that identifies you without first obtaining your consent. We may also use such data for any of the other purposes listed in this policy, such as internal analysis, or to personalize offers we provide to you.</p>\n <br>\n\n <strong>Advertising</strong>\n <p>You may see advertisements when you visit our websites, mobile websites, in mobile applications, or on your device. We may help advertisers better reach our customers by providing certain information, including device type, geographic information, language preferences or demographic information obtained from other companies to allow advertisers to determine which ads may be more relevant to you. However, we do not share Personal Information for advertising purposes outside of our corporate family without your consent.</p>\n <br>\n <p>Some examples of the types of advertising you might see include:</p>\n <br>\n <p><i>Our Ads on Our Websites.</i> We may provide advertisements, such as banner ads, on our websites, mobile websites, and in mobile applications and widgets you may download, access or use on your device.</p>\n <br>\n <p><i>Other Company Ads on Our Websites.</i> You may also see third-party advertisements on some T-Mobile websites, services, or in applications, or on devices. These third-party advertisers, or their ad networks, may place or access cookies, web beacons, or similar technologies on your device, or use your device identifier, and may collect certain anonymous or de-identified information about your visit on our websites. The third-party advertisers who provide these ads may use this information to provide you with advertising on our websites, as well as on other websites. We do not have control over or access to any information contained in the cookies that are set on your computer or device by ad servers, ad networks, or third-party advertisers.</p>\n <br>\n <p><i>Our Ads on Other Websites.</i> We may ask third-parties to place advertisements about our products and services on other websites, mobile websites and in mobile applications and widgets. The use of cookies, web beacons, or similar technologies by such third-parties on other websites is subject to any applicable privacy policies that they may have, not this Policy.</p>\n <br>\n <p><strong id="choicesaboutadvertising"><i>Interest-Based Ads.</i></strong> You may receive ads from us and our ad providers that are tailored to your interests. These interest-based ads are selected based on your use of our services and products as well as other information obtained by us and our ad providers. None of this information is Personal Information.</p>\n\n <ul>\n <li>We do not provide your Personal Information to third-party advertisers without your consent.</li>\n\n <li>Advertising may be tailored to the interests that advertisers have inferred from your browsing of our websites or other websites or applications with which the third-party partners to provide advertising.</li>\n\n <li>We may provide third-party advertisers with aggregated or de-identified location, demographic or similar data (unrelated to your browsing activities) that does not personally identify you. This data may be used by advertisers to help tailor their ads on our websites, and on other sites and applications.</li>\n\n <li>We, and our providers, may use a de-identified profile of your web-browsing and application use activity and interests. This profile does not contain information that identifies you personally, but may include a unique or encrypted identifier that enables your device to be matched to a profile of your browsing activity and de-identified characteristics about your interests.</li>\n\n <li>When we use information associated with your web browsing activities on websites that are not our own to provide interest-based advertising or offers, we will provide you with notice and appropriate choice.\n <br>\n <br>\n For more information see <a href="/Company/PrivacyResources.aspx?tp=Abt_Tab_YourPrivacychoices&amp;tsp=Abt_Sub_AdOptions">privacy resources/T-Mobile Ad Options for Your Device</a></li>\n\n <li style="MARGIN-LEFT: 0px; LIST-STYLE-TYPE: none">\n <br>\n <strong>Choices About Advertising.</strong>\n </li>\n\n <li style="LIST-STYLE-TYPE: none">\n <br>\n <p>T-Mobile adheres to the Digital Advertising Alliance\u2019s (\u201cDAA\u201d) Self-Regulatory Principles for Online Behavioral Advertising.</p>\n </li>\n\n <li>\n <p><i>On Your Mobile Device.</i> Where we offer interest-based ads, you can opt-out of certain interest-based advertising by clicking on the ad options link on or near the advertisement or by clicking <a href="http://iba.t-mobile.com/tmo/">here</a>.</p>\n\n <ul>\n <li>If you turn off interest-based ads, you will still see just as many ads, but the ads may not be based on your interests and may be less relevant to you.</li>\n\n <li>Your choice only affects the ads you see on websites and applications you access on your device.</li>\n\n <li>If your device\x92s browser cookies are deleted, or your device is reset, you may need to reset the interest-based ads feature.</li>\n\n <li>If you are using your device, but are not on our network (such as a WiFi network), we, and our ad providers, may not be able to identify your ad choices.</li>\n </ul>\n </li>\n\n <li><i>On Your Computer or Non-Mobile Device.</i> For information about targeted advertising, or to opt-out of use of your browser information for purposes of certain third-party advertising, please visit <a href="http://www.aboutads.info/choices">www.aboutads.info/choices</a>. Please note that if you opt out, you will continue to receive the same number of ads, but they may be less relevant because they will not be based on your interests. You may still see ads related to content on a web page or based on other nonpersonal information. Please note that this opt-out is cookie-based. If you change computers or devices, change web browsers, or delete cookies, you will need to visit the aboutads site and opt-out again.</li>\n </ul>\n </div>\n\n <div class="faqitem">\n <div class="header">\n <a class="icon" id="A3" href="#top" name="collectionuse">\n <img title="Up" height="14" src="https://s.tmocache.com/images/arrowup.gif" width="14" border="0">top</a><b>WHEN WE SHARE INFORMATION COLLECTED ABOUT YOU</b>\n </div>\n\n <br>\n\n\n <p>We do not sell, license, rent, or otherwise provide your Personal Information to unaffiliated third-parties (parties outside the T-Mobile corporate family) to market their services or products to you without your consent. We may, however, disclose your information to unaffiliated third-parties as follows:</p>\n\n <br>\n <strong>With Your Consent</strong>\n\n <p>We may disclose Personal Information about you to third-parties with your consent. We may obtain your consent in writing; online, through "click-through" agreements; when you accept the terms of disclosures on your phone for certain applications or services; orally, in our stores or on the phone, including through interactive voice response, or implicitly, for example, when you purchase a product and ask that it be shipped to your home, consenting to our disclosure of your name and address to a third-party shipping company to complete delivery.</p>\n <strong>To the Primary Account Holder</strong>\n\n <p>We may disclose information about an account user to the primary account holder (the party financially responsible for the account). If a business, governmental agency, or other individual obtains service for you, that entity or individual is our customer, and we may provide information about you or your use of the service, products or devices to them or others at their direction.</p>\n\n <p>When you are the primary account holder, but you receive special or discounted pricing, terms, or other benefits through another party\x92s agreement with us (for example, an employee discount), we may provide enough information to that party to verify your initial and continuing eligibility for benefits under their agreement with us and to calculate any associated discounts.</p>\n <strong>To Our Service Providers</strong>\n\n <p>We may disclose information to third-party vendors and partners who complete transactions or perform services on our behalf (for example, credit/debit card processing, billing, shipping, repair, customer service, auditing, and marketing).</p>\n <strong>Third-Party Carriers and Suppliers</strong>\n\n <p>If you are roaming on the network of another carrier or WiFi service provider, your wireless telephone number, your location, the numbers you dial, and other information about your usage will be available to that carrier to facilitate that service. Additionally, services and functionality offered through certain devices are sometimes provided in conjunction with entities other than T-Mobile. As a result, Personal Information from your devices may be uploaded and stored on their servers. For instance, BlackBerry\xae service is provided in conjunction with Research in Motion (RIM), and Personal Information from your device is stored on their BlackBerry Enterprise ServersTM. Their specific terms and conditions, terms of use, and privacy polices apply to those services.</p>\n <strong>In a Business Transfer</strong>\n\n <p>We may sell, disclose, or transfer information about you as part of a corporate business transaction, such as a merger or acquisition, joint venture, corporate reorganization, financing, or sale of company assets, or in the unlikely event of insolvency, bankruptcy, or receivership, in which such information could be transferred to third-parties as a business asset in the transaction. We may also share information with banks for purposes of transferring loans in connection with your device financing.</p>\n <strong>For Legal Process &amp; Protection</strong>\n\n <p>We may disclose Personal Information, and other information about you, or your communications, where we have a good faith belief that access, use, preservation or disclosure of such information is reasonably necessary:</p>\n\n <ul>\n <li>To satisfy any applicable law, regulation, legal process or enforceable governmental request;</li>\n\n <li>To enforce or apply agreements, or initiate, render, bill, and collect for services and products (including to collection agencies in order to obtain payment for our products and services);</li>\n\n <li>To protect our rights or interests, property or safety or that of others;</li>\n\n <li>In connection with claims, disputes, or litigation \x96 in court or elsewhere;</li>\n\n <li>To protect users of our services and other carriers or providers from fraudulent, abusive, or unlawful use of, or subscription to, such services;</li>\n\n <li>When information is reported to the Spam Reporting Service, it may be shared with government agencies and others that work to combat spam and prevent fraudulent, deceptive, and unfair practices;</li>\n\n <li>To facilitate or verify the appropriate calculation of taxes, fees, or other obligations due to a local, state, or federal government; or</li>\n\n <li>In an emergency situation.</li>\n </ul>\n <strong>Co-Sponsored Websites and Partners</strong>\n\n <p>If you provide information to us in connection with a co-sponsored website, this Policy will apply to our use of the information and the co-sponsor\x92s policy will apply to their use of the information. If you purchase equipment or activate service at one of our partner\x92s locations (including websites of such dealer or retailer), they may request information from you that is passed to us as part of the activation process, but which may also be retained by the partner. This Policy will govern our use of such information, and the partner\x92s privacy policy will govern its use of such information.</p>\n <strong>De-Identified Information</strong>\n\n <p>We may provide information that does not identify you personally to third-parties for marketing, advertising or other purposes.</p>\n <p>For more information about our INSIGHTS Program see <a href="/Company/PrivacyResources.aspx?tp=Abt_Tab_YourPrivacychoices&amp;tsp=Abt_Sub_TmobileInsights">Privacy Resources/T-Mobile INSIGHTS</a></p>\n <strong>Third-Party Applications for Your Devices</strong>\n\n <p>We are not responsible for the third-party applications (for example, applications, programs, widgets, etc.) you select and install on your device. When you install third party applications, you may give your consent for the third party to access information stored on the device and on our network to facilitate the application\x92s functions (for example, you may consent to third-party access to your location information \x96 see Location Based Services). The manner in which such third-parties may use, share, or disclose such information is governed by the terms and conditions and privacy policy provided by that third party \x96 not by this Policy. For more information, see <a href="/Company/PrivacyResources.aspx?tp=Abt_Tab_ThirdParty">Privacy Resources/Device Apps</a></p>\n\n <br>\n </div>\n\n <div class="faqitem">\n <div class="header">\n <a class="icon" id="A4" href="#top" name="collectionuse">\n <img title="Up" height="14" src="https://s.tmocache.com/images/arrowup.gif" width="14" border="0">top</a><b>HOW WE STORE AND PROTECT THE INFORMATION COLLECTED ABOUT YOU</b>\n </div>\n <strong>Protecting Your Information</strong>\n\n <p>We use a variety of physical, electronic, and procedural safeguards to protect Personal Information from unauthorized access, use, or disclosure while it is under our control.</p>\n\n <p>We provide password protected online access to your account information through my.t-mobile.com. For multi-line accounts, the primary account holder is authorized to access online account information for all the devices and lines on the account. Other users may generally access online account information related only to their respective device and line (for example, if a parent provides a device to their child, the child may access online information about that device and line\x96 including CPNI). The primary account holder, however, may designate additional or more limited access rights for other users on the account.</p>\n\n <p>Under federal law, you have a right, and we have a duty, to protect the confidentiality of CPNI and we have adopted policies and procedures designed to ensure compliance with those rules. We will not intentionally disclose your CPNI to third-parties without your permission, except as allowed under FCC rules, applicable law, or explained in this Policy. However, if you are the primary account holder, you may designate other "authorized users" (for example, a spouse) to access and manage your account information, including CPNI. For more information see <a href="/Company/PrivacyResources.aspx?tp=Abt_Tab_CPNI">Privacy Resources/Customer Proprietary Network Information</a></p>\n <strong>Retention and Disposal</strong>\n\n <p>We retain information only for as long as we have a business or tax need or as applicable laws, regulations, or government orders require. When we dispose of Personal Information, we use reasonable procedures designed to erase or render it unreadable (for example, shredding documents and wiping electronic media).</p>\n </div>\n\n <div class="faqitem">\n <div class="header">\n <a class="icon" id="A5" href="#top" name="collectionuse">\n <img title="Up" height="14" src="https://s.tmocache.com/images/arrowup.gif" width="14" border="0">top</a><b>HOW YOU CAN UPDATE YOUR INFORMATION AND CHOOSE HOW WE CONTACT YOU</b>\n </div>\n\n <br>\n <strong>Access to Your Information</strong>\n\n <p>You may access and modify your contact information by visiting <a href="https://my.t-mobile.com">my.t-mobile.com</a> or a T-Mobile retail store, or by contacting Customer Service. You may also contact us using the information in the <a href="#contactus">How to Contact Us</a> section below.</p>\n <strong id="infochoices">Choices Regarding Use of Your Information</strong>\n\n <p>We may send you communications about services or products we, or our partners, sell. We want to provide you with meaningful choices regarding our marketing communications, and you may choose to limit or opt-out of some marketing communications from us at any time. Although you may elect not to receive marketing information from us, if you subscribe to our services or buy our products, you will continue to receive invoices, customer-service and transactional notices, and similar communications. The Primary Account Holder can configure options for marketing communications for all lines on the account.</p>\n\n <p>If you are a T-Mobile customer and you manage your account online, you can manage your preferences regarding marketing communications by logging into your <a href="https://my.t-mobile.com">my.t-mobile.com</a> profile. If you do not manage your account online, or you are not a current T-Mobile customer, you may manage your preferences regarding marketing communications <a href="/company/website/OptOut.aspx?type=1">here</a>.</p>\n\n <p>You may also manage your preferences regarding marketing communications by contacting Customer Service by dialing 611 from your T-Mobile phone or <span class="tmo_tfn_number">1-800-937-8997</span> from any phone, or, with respect to marketing e-mails, by following the "unsubscribe" instructions on any marketing e-mail we send you.</p>\n\n <p>See also <a href="/Company/PrivacyResources.aspx?tp=Abt_Tab_DoNotCallPolicy">Privacy Resources/Marketing Choice</a></p>\n <strong>Do Not Call Registry</strong>\n\n <p>The FTC maintains a National Do Not Call Registry at <a href="https://www.donotcall.gov/">https://www.donotcall.gov/</a>, and your state may maintain its own Do Not Call Registry. Putting your number on these Registries also may limit our telemarketing calls to that number.</p>\n\n <br>\n </div>\n\n <div class="faqitem">\n <div class="header">\n <a class="icon" id="A6" href="#top" name="collectionuse">\n <img title="Up" height="14" src="https://s.tmocache.com/images/arrowup.gif" width="14" border="0">top</a><b>YOUR ROLE IN PROTECTING YOUR PRIVACY</b>\n </div>\n\n <p>You play an important role in ensuring the security of Personal Information. We encourage you to use safeguards to protect your information and devices. For more information please see <a href="/Company/PrivacyResources.aspx?tp=Abt_Tab_Resources">Privacy Resources/Protecting Your Privacy</a>.</p>\n\n <br>\n </div>\n\n <div class="faqitem">\n <div class="header">\n <a class="icon" id="A7" href="#top" name="collectionuse">\n <img title="Up" height="14" src="https://s.tmocache.com/images/arrowup.gif" width="14" border="0">top</a><b>OTHER INFORMATION YOU SHOULD KNOW</b>\n </div>\n <strong>Consumer Code for Wireless Service</strong>\n\n <p>We follow the <a href="http://www.ctia.org/policy-initiatives/voluntary-guidelines/consumer-code-for-wireless-service">Consumer Code for Wireless Service</a> established by the Cellular Telecommunications &amp; Internet Association ("CTIA"). In doing so, we want to help customers understand their bills, receive quality service, and make informed choices and conform our information practices under this Policy to meet the requirements of applicable federal and state laws and regulations.</p>\n <strong>Your California Privacy Rights</strong>\n\n <p>California Civil Code Section 1798 entitles California customers to request information concerning whether a business has disclosed Personal Information to any third parties for the third parties\x92 direct marketing purposes. As stated in this Policy, we will not sell or share your Personal Information with non-affiliated companies for their direct marketing purposes without your consent. California customers who wish to request further information about our compliance with this law or have questions or concerns about our privacy practices and policies may contact us as specified in the <a href="#contactus">How to Contact Us</a> section below.</p>\n\n <br>\n </div>\n\n <div class="faqitem">\n <div class="header">\n <a class="icon" id="A8" href="#top" name="collectionuse">\n <img title="Up" height="14" src="https://s.tmocache.com/images/arrowup.gif" width="14" border="0">top</a><b>PRIVACY POLICY UPDATES AND CONTACT INFORMATION</b>\n </div>\n <strong>How We Communicate Changes to This Policy</strong>\n\n <p>We may update this Policy at any time to provide updates to or clarification of our practices. If we make changes, we will revise the date at the top of the Policy. If we propose to use Personal Information in a materially different way, we will provide you with notice by posting notice of the changes on our website for at least 30 days before we implement those changes, and obtain your consent as specified above for any material change regarding disclosure of Personal Information. You should refer to this Policy often for the latest information and the effective date of any changes.</p>\n <strong>How to Contact Us</strong>\n\n <p>If you have any questions or comments about this Policy or about T-Mobile\'s privacy practices, please call Customer Service at 611 (from a T-Mobile phone) or <span class="tmo_tfn_number">1-800-937-8997</span> (from any phone) or send an e-mail message to <a href="mailto:privacy@t-mobile.com">privacy@t-mobile.com.</a> You may also direct your privacy-related comments or questions to the address below:</p>\n\n <div id="contactus">\n <br>\n T-Mobile USA, Inc.\n <br>\n Attn: Chief Privacy Officer\n <br>\n 12920 SE 38th Street\n <br>\n Bellevue, Washington 98006\n <br>\n <br>\n <br>\n </div>\n </div>\n</div>'} 2017-02-26 16:56:17 [scrapy] DEBUG: Scraped from <200 https://www.t-mobile.com/company/website/privacypolicy.aspx> {'content': u'<div class="faq" style="MARGIN-TOP: 50px">\n <a id="fullpolicy" name="fullpolicy"></a>\n\n <div style="FONT-WEIGHT: bold">\n <h3>T-Mobile Privacy Policy</h3>\n </div>\n December 31, 2016\n <br>\n <a class="primary" href="javascript:var%20popupwin=this.window.open(\'http://es.t-mobile.com/company/website/privacypolicy.aspx?WT.z_unav=ftr__privacypolicy\',665,%22height=600,width=800,screenX=800,screenY=600,left=10,top=10,toolbar=no,location=no,menubar=no,status=no,resizable,scrollbars%22);popupwin.focus();">Please click here for Spanish version of the T-Mobile Privacy Policy</a>\n <br>\n <a class="primary" href="/company/website/privacypolicy.aspx#policyhighlights">Please click here for the T-Mobile Privacy Policy Highlights</a>\n <br>\n <br>\n\n\n <p>This Privacy Policy ("Policy") describes how information about you is collected, used, and disclosed by T-Mobile USA, Inc. ("T-Mobile") and provides other important privacy information, describes when and how we may change this Policy, and tells you how to contact us with any questions or comments.</p>\n\n <br>\n <br>\n\n\n <div class="faqitem">\n <div class="header">\n <a class="icon" id="collectionuse " href="#top" name="collectionuse">\n <img title="Up" height="14" src="https://s.tmocache.com/images/arrowup.gif" width="14" border="0">top</a><b>WHAT TYPES OF INFORMATION WE COLLECT ABOUT YOU</b>\n </div>\n\n <p>We collect information about you and your associated device(s) when you use our products or services or otherwise interact with us or with third-party services through our products and services. Examples of the types of information we collect include:</p>\n <strong>Personal Information</strong>\n\n <p>"Personal Information" means information that we directly associate with a specific person or entity (for example, name; addresses; telephone numbers; email address; Social Security Number; call records; wireless device location). Personal information does not include "de-identified,\x94 "anonymous," or "aggregate" information \x96 which are not associated with a specific person or entity.</p>\n <strong>Customer Proprietary Network Information (CPNI)</strong>\n\n <p>Customer Proprietary Network Information, or "CPNI", is a subset of Personal Information that is generated in connection with the telecommunications services we provide to you. CPNI includes, for example, call details, call location information, and certain information about your rate plans and features. CPNI does not include your name, address, and phone number.</p>\n\n <p>For more information see <a href="/Company/PrivacyResources.aspx?tp=Abt_Tab_CPNI">Privacy Resources/Customer Proprietary Network Information</a></p>\n <strong>Credit and Financial Information</strong>\n\n <p>We collect information about your credit card or banking information, Social Security Number, and credit history for account opening, management and billing and collection purposes. Financial information we collect is governed by <a href="https://www.t-mobile.com/pdf/T-Mobile-Financial-Privacy-Policy_EN.pdf%20" target="_blank">T-Mobile\x92s Financial Privacy Policy</a></p>\n <strong>Network and Device Information</strong>\n\n <p>We may collect information about your use of our network (or other carriers\x92 networks when roaming domestically and internationally) and the device(s) associated with your account, network data related to WiFi usage and device, and performance information, as well as data relating to your use of our website, applications and other products and services.</p>\n\n <br>\n <strong>Location Data</strong>\n\n <p>We may collect your device\'s location whenever it is turned on (subject to coverage limitations).</p>\n <strong>Performance and Diagnostic Data</strong>\n\n <p>We may collect performance and diagnostic data about your use of our network, networks you roam on, WiFi services or your device. For example, we may collect information about the performance of the device, signal strength, dropped calls, data failures, battery strength and other device or network performance issues. We may also collect information about applications on your device, the fact that an application has been added, when an application is launched or fails to launch, and length of time an application has been running.</p>\n\n <strong>Telematics</strong>\n <p>If you are a customer of the T-Mobile SyncUp connected car service, we, and our application provider, collect data from the SyncUp device in your car. This data includes driver behavior information such as acceleration and braking, speed, and RPM. The device also reports vehicle location via GPS and can report on common vehicle issues called Diagnostic Trouble Codes (DTC).</p>\n\n <strong>Video Data</strong>\n\n <p>When you use a T-Mobile video application, for example T-Mobile TV, on your device, we may collect information about the programs you watch to determine customer viewing habits so that we can tailor video selections to you or our customers.</p>\n <strong>Back Up and Cloud Services</strong>\n\n <p>Some devices may automatically upload to T-Mobile network servers information you have stored on the device and/or SIM card in order to facilitate specific functions. For instance, some devices may back-up your address book, photo album, or diagnostic data. You may choose to disable such uploads, but this may affect functionality of the device or your services. We may also provide you the ability to upload other information from your device to T-Mobile or third-party network servers. For instance, you may have the option to upload pictures, text messages, recordings, calendars, tasks, or notes.</p>\n <strong>Collection of Information About Children</strong>\n\n <p>We do not knowingly solicit children to purchase our services or products. If, however, you authorize a child to use our services or products by providing them a device associated with your account, any information associated with such use will be treated as your information in accordance with this Policy. If you are the primary account holder, you will have the ability to set the marketing preferences for any other lines on your account, including those for any children to whom you provide a device.</p>\n\n <p>Our websites are not designed to attract children under the age of 13 and we do not intentionally or knowingly collect Personal Information on our websites from anyone under the age of 13. We encourage parents to be involved in the online activities (including wireless Internet browsing) of their children to ensure that no information is collected from a child without parental permission.</p>\n\n <br>\n </div>\n\n <div class="faqitem">\n <div class="header">\n <a class="icon" id="A1" href="#top" name="collectionuse">\n <img title="Up" height="14" src="https://s.tmocache.com/images/arrowup.gif" width="14" border="0">top</a><b>HOW INFORMATION ABOUT YOU IS COLLECTED</b>\n </div>\n\n <p>T-Mobile collects information about you in three primary ways:</p>\n <strong>Information You Provide</strong>\n\n <p>We collect information that you provide to us when you apply for, purchase, or use our products or services, or otherwise communicate with us.</p>\n For example, some of the ways you may provide information to us include:\n\n <ul>\n <li><p>When you sign up for our voice or data services or purchase other products or services, we may collect personal contact, billing, and credit information.</p></li>\n\n <li><p>When you establish or modify an online account, we may collect user identification information, passwords, and/or security question responses that you will use for future sign-on.</p></li>\n\n <li><p>When you interact with our customer service representatives, enter information on our websites, submit survey responses, or pay for services, we may also collect Personal Information and other information. We may monitor and record phone calls, e-mails, live chats, or other communications between you, your device, and our customer service representatives or other employees or representatives.</p></li>\n\n <li><p>When you use our services on a phone provided to you by an account holder.</p></li>\n </ul>\n <strong>Information We Collect Automatically</strong>\n\n <p>We automatically collect a variety of information associated with your use of your device (on our network, when roaming, or in WiFi mode) and our products and services, some of which may be associated with you or another user on your account.</p>\n\n <br>\n For example some of the ways we may automatically collect information include:\n\n <ul>\n <li><p>Our systems capture details about the type and location of wireless device(s) you use, when the device is turned on, calls and text messages you send and receive (but we do not retain the content of those calls or messages after delivery), and other data services you use.</p></li>\n\n <li><p>We may also gather information about the performance of your device and our network. Some examples of the types of data collected include: the applications on the device, signal strength, dropped calls, data failures, and other device or network performance issues.</p></li>\n\n <li>\n <strong>Cookies, Web Beacons, and Similar Technologies</strong>\n\n <p>We may use, or we may engage third-parties to use on our behalf, cookies (small data text files placed on your computer or device) or similar technologies to identify your computer or device and record your preferences and other data so that our websites can personalize your visit(s), see which areas and features of our websites are popular, and improve our websites and your experience.</p>\n\n <p>We may also use web beacons (small graphic images on a web page or an HTML e-mail) to monitor interaction with our websites or e-mails. Web beacons are generally invisible because they are very small (only 1-by-1 pixel) and the same color as the background of the web page or e-mail message.</p>\n\n <p>The information we receive through cookies, web beacons and similar technologies may enable us to recognize users across devices, such as smartphones, computers, tablets or related browsers. Depending upon your device or computer, you may be able to set your browser(s) to reject cookies or delete cookies, but that may result in the loss of some functionality on our websites. If we combine or link cookie or web beacon information with Personal Information, we will treat the combined or linked information as Personal Information under this Policy.</p>\n </li>\n\n <li style="LIST-STYLE-TYPE: none">\n <br>\n </li>\n\n <li>\n <strong>Web Browsing Activity</strong>\n\n <p><i>Our Websites.</i> When accessing our websites, mobile websites and related applications and widgets designed for your device or web-based experience, we automatically collect certain information about your device and your visit, such as your IP address, browser type, date and time, the web page you visited before visiting our website, your activities and purchases on our websites, and other analytical information associated with the sites.</p>\n\n <p><i>Other Websites.</i> When your device\x92s web browser utilizes our data services to access websites other than our own, we automatically capture information associated with your browsing activities, and measure and monitor network and Internet connection performance, throughput, latency, and similar network data.</p>\n\n <p><i>Do Not Track Policy.</i> Some browsers have incorporated "Do Not Track" features. Most of these features, when turned on, send a signal or preference to the websites you visit indicating that you do not wish to be tracked. Those sites (or the third party content on those sites) may continue to engage in activities you might view as tracking even though you have expressed this preference, depending on the sites\x92 privacy practices. Because there is not yet a common understanding of how to interpret the DNT signal, we do not currently respond to the browser DNT signals when you use our services and products or interact with our websites or online services. We do allow you to exercise choice regarding the collection of information by third parties about your online activities over time and across third-party websites or online services for online interest based advertising purposes and to opt out of our interest-based advertising on your device, as described <a href="#choicesaboutadvertising">below</a>.</p>\n </li>\n\n <li>\n <strong>Voice Controlled Applications</strong>\n\n <p>If you use a voice-controlled application, that application may collect and record your requests and other information from you and your phone.</p>\n </li>\n <li>\n <strong>Retail Beacons</strong>\n <p>We may use beacon devices in our retail locations that collect data about your device. These programs use signals from smart devices (like mobile phones and tablets) to track movement and wait times. Retail beacons collect a unique identifier that your device routinely transmits (e.g., a MAC address) and coverts it to an identifier unique to T-Mobile. In some cases, we will use identifiers that are already routinely collected by the T-Mobile network in order to provide you with wireless service. We use aggregated data in order to understand general traffic trends in our stores. This helps us to better service our customers.</p>\n </li>\n </ul>\n <strong>Information From Other Sources</strong>\n\n <p>We may also obtain information about you from other sources. For example, we may receive credit information from third-party sources before initiating your service, or background information in connection with employment opportunities. We may also obtain updated address information from our shippers or other vendors. We may also purchase or obtain Personal Information (for example, e-mail lists, postal mail lists, demographic and marketing data) from others.</p>\n\n <br>\n </div>\n\n <div class="faqitem">\n <div class="header">\n <a class="icon" id="A2" href="#top" name="collectionuse">\n <img title="Up" height="14" src="https://s.tmocache.com/images/arrowup.gif" width="14" border="0">top</a><b>HOW WE USE INFORMATION WE COLLECT ABOUT YOU</b>\n </div>\n\n <p>We use the information we collect for a variety of business purposes, such as:</p>\n\n <ul>\n <li>To route your calls or message or otherwise provide you with service;</li>\n\n <li>To provide and bill for products and services you purchase and charge to your account;</li>\n\n <li>To deliver and confirm products and services you obtain from us;</li>\n\n <li>To verify your identity and maintain a record of your transactions and interactions with us;</li>\n\n <li>To provide customer and technical services to you;</li>\n\n <li>To create, modify, improve, enhance, remove or fix our network, products and services, and their performance;</li>\n\n <li>To identify and suggest products or services that might interest you;</li>\n\n <li>To make internal business decisions about current and future product and service offerings;</li>\n\n <li>To provide you customized user experiences, including personalized product and service offerings;</li>\n\n <li>To protect our rights, interests, safety and property and that of our customers, service providers and other third parties; and</li>\n\n <li>To co mply with law or as required for legal purposes.</li>\n </ul>\n\n <br>\n <strong>Fraud Prevention</strong>\n\n <p>We may use Personal Information, including voice print recordings, account information (such as purchase patterns) and device information for investigations or prevention of fraud or network abuse. We provide fraud prevention services to banks or other third parties. As part of this service, we may verify your phone number to help those third parties prevent your personal information from being used for fraudulent purposes. We also may provide the information you report as spam to 7726 to a third party to prevent fraud or network abuse, and we may share such information with government agencies and others that work to combat spam and prevent fraudulent, deceptive, and unfair practices.</p>\n <strong>Information Collected from Cookies</strong>\n\n <p>We may also use information collected from cookies or other similar technologies to improve our websites, make recommendations, and complete transactions you request.</p>\n <strong>Marketing</strong>\n\n <p>We may use information we collect to contact you about T-Mobile or third-party products, services, and offers that we believe you may find of interest. We may contact you by telephone, postal mail, e-mail, or other methods. You may opt-out of receiving marketing communications from us at any time as outlined below in <a href="#infochoices">Choices Regarding Use of Your Information</a>.</p>\n <strong>Directories</strong>\n\n <p>We do not publish directories of our customers\x92 wireless numbers; nor will we provide or make such numbers available to third-parties for listing in their public directories, without the customer\x92s prior consent.</p>\n <strong>Performance, Diagnostics &amp; Management</strong>\n\n <p>We collect information about devices, our network and WiFi usage to perform diagnostic analyses and understand how your device is performing overall. Diagnostic data helps us troubleshoot technical issues related to your device\x92s performance such as battery life, dropped calls, processing speed, device memory, service coverage, and network and WiFi signal strength that you and other customers may experience. If you are using a device in WiFi mode, we may collect information about that usage, such as the routing address and IP address. We also may use diagnostic data to identify and recommend products and services.</p>\n <strong>Location-Based Services</strong>\n\n <p>We use location information to route wireless communications and to provide 911 service, which allows emergency services to locate your general location. We may disclose, without your consent, the approximate location of a wireless device to a governmental entity or law enforcement authority when we are served with lawful process or reasonably believe there is an emergency involving risk of death or serious physical harm.</p>\n\n <p>Depending on your device, you may also be able to obtain a wide array of services based on the location of your device (for example, driving directions, enhanced 411 Directory Assistance, Find My Device, or search results, etc.). These data services, known as Location-Based Services ("LBS") are made available by us and others, usually via applications. These services use various location technologies and acquire location data from various sources.</p>\n\n <p>These applications and services use various location technologies (including Global Positioning Satellite ("GPS"), Assisted GPS ("AGPS"), cell ID and enhanced cell ID technologies) to identify the approximate location of a device, which is then used in conjunction with the application to enhance the user\x92s experience (for example, to provide driving directions, to provide enhanced 411 Directory Assistance, or search results, etc.)</p>\n\n <p>LBS may, or may not, involve any interaction with or dependency on our network, and location-based services may or may not look to our network to obtain location data. Where we allow third parties the capability of accessing data about your location that is derived from our network, we require those third parties to observe specific privacy and security protections consistent with this policy.</p>\n\n <p>It is important that you understand the location capabilities and settings of your device, and that you carefully read and understand the terms under which these services are provided \x96 whether by us or another entity.</p>\n\n <p>You should carefully review the privacy policies and other terms of third-parties with whom you have authorized the sharing of your location information, and you should consider the risks involved in disclosing your location information to other people.</p>\n\n <p>Where we provide a location-based service, you will receive notice of the location features of the service and collection of location data is with your consent. You will be provided options for managing when and how such information should be shared (except in the case of certain parental controls or similar services associated with enterprise or multi-line accounts \x96 for example, T-Mobile\x92s FamilyWhereTM services \x96 which may be managed solely by the primary account holder or their designee, but always with notice to the end-user). T-Mobile follows the CTIA\x92s Best Practices Guidelines for Location-Based Services, which are available <a href="http://www.ctia.org/policy-initiatives/voluntary-guidelines/best-practices-and-guidelines-for-location-based-services">here</a>.</p>\n <br>\n <p>For more information on location services, see <a href="/Company/PrivacyResources.aspx?tp=Abt_Tab_LocationServices">Privacy Resources/Location Services</a></p>\n <br>\n\n <strong>Telematics</strong>\n <p>Data from our SyncUp connected car service is used to provide you with that vehicle monitoring service, to enable the functions of the SyncUp associated Motion app, and to enable WiFi connectivity in your car. In addition, your data may be shared with our application provider in order to enable third-party services that use your personal data, though in such cases no third-party will be granted access to data that identifies you without first obtaining your consent. We may also use such data for any of the other purposes listed in this policy, such as internal analysis, or to personalize offers we provide to you.</p>\n <br>\n\n <strong>Advertising</strong>\n <p>You may see advertisements when you visit our websites, mobile websites, in mobile applications, or on your device. We may help advertisers better reach our customers by providing certain information, including device type, geographic information, language preferences or demographic information obtained from other companies to allow advertisers to determine which ads may be more relevant to you. However, we do not share Personal Information for advertising purposes outside of our corporate family without your consent.</p>\n <br>\n <p>Some examples of the types of advertising you might see include:</p>\n <br>\n <p><i>Our Ads on Our Websites.</i> We may provide advertisements, such as banner ads, on our websites, mobile websites, and in mobile applications and widgets you may download, access or use on your device.</p>\n <br>\n <p><i>Other Company Ads on Our Websites.</i> You may also see third-party advertisements on some T-Mobile websites, services, or in applications, or on devices. These third-party advertisers, or their ad networks, may place or access cookies, web beacons, or similar technologies on your device, or use your device identifier, and may collect certain anonymous or de-identified information about your visit on our websites. The third-party advertisers who provide these ads may use this information to provide you with advertising on our websites, as well as on other websites. We do not have control over or access to any information contained in the cookies that are set on your computer or device by ad servers, ad networks, or third-party advertisers.</p>\n <br>\n <p><i>Our Ads on Other Websites.</i> We may ask third-parties to place advertisements about our products and services on other websites, mobile websites and in mobile applications and widgets. The use of cookies, web beacons, or similar technologies by such third-parties on other websites is subject to any applicable privacy policies that they may have, not this Policy.</p>\n <br>\n <p><strong id="choicesaboutadvertising"><i>Interest-Based Ads.</i></strong> You may receive ads from us and our ad providers that are tailored to your interests. These interest-based ads are selected based on your use of our services and products as well as other information obtained by us and our ad providers. None of this information is Personal Information.</p>\n\n <ul>\n <li>We do not provide your Personal Information to third-party advertisers without your consent.</li>\n\n <li>Advertising may be tailored to the interests that advertisers have inferred from your browsing of our websites or other websites or applications with which the third-party partners to provide advertising.</li>\n\n <li>We may provide third-party advertisers with aggregated or de-identified location, demographic or similar data (unrelated to your browsing activities) that does not personally identify you. This data may be used by advertisers to help tailor their ads on our websites, and on other sites and applications.</li>\n\n <li>We, and our providers, may use a de-identified profile of your web-browsing and application use activity and interests. This profile does not contain information that identifies you personally, but may include a unique or encrypted identifier that enables your device to be matched to a profile of your browsing activity and de-identified characteristics about your interests.</li>\n\n <li>When we use information associated with your web browsing activities on websites that are not our own to provide interest-based advertising or offers, we will provide you with notice and appropriate choice.\n <br>\n <br>\n For more information see <a href="/Company/PrivacyResources.aspx?tp=Abt_Tab_YourPrivacychoices&amp;tsp=Abt_Sub_AdOptions">privacy resources/T-Mobile Ad Options for Your Device</a></li>\n\n <li style="MARGIN-LEFT: 0px; LIST-STYLE-TYPE: none">\n <br>\n <strong>Choices About Advertising.</strong>\n </li>\n\n <li style="LIST-STYLE-TYPE: none">\n <br>\n <p>T-Mobile adheres to the Digital Advertising Alliance\u2019s (\u201cDAA\u201d) Self-Regulatory Principles for Online Behavioral Advertising.</p>\n </li>\n\n <li>\n <p><i>On Your Mobile Device.</i> Where we offer interest-based ads, you can opt-out of certain interest-based advertising by clicking on the ad options link on or near the advertisement or by clicking <a href="http://iba.t-mobile.com/tmo/">here</a>.</p>\n\n <ul>\n <li>If you turn off interest-based ads, you will still see just as many ads, but the ads may not be based on your interests and may be less relevant to you.</li>\n\n <li>Your choice only affects the ads you see on websites and applications you access on your device.</li>\n\n <li>If your device\x92s browser cookies are deleted, or your device is reset, you may need to reset the interest-based ads feature.</li>\n\n <li>If you are using your device, but are not on our network (such as a WiFi network), we, and our ad providers, may not be able to identify your ad choices.</li>\n </ul>\n </li>\n\n <li><i>On Your Computer or Non-Mobile Device.</i> For information about targeted advertising, or to opt-out of use of your browser information for purposes of certain third-party advertising, please visit <a href="http://www.aboutads.info/choices">www.aboutads.info/choices</a>. Please note that if you opt out, you will continue to receive the same number of ads, but they may be less relevant because they will not be based on your interests. You may still see ads related to content on a web page or based on other nonpersonal information. Please note that this opt-out is cookie-based. If you change computers or devices, change web browsers, or delete cookies, you will need to visit the aboutads site and opt-out again.</li>\n </ul>\n </div>\n\n <div class="faqitem">\n <div class="header">\n <a class="icon" id="A3" href="#top" name="collectionuse">\n <img title="Up" height="14" src="https://s.tmocache.com/images/arrowup.gif" width="14" border="0">top</a><b>WHEN WE SHARE INFORMATION COLLECTED ABOUT YOU</b>\n </div>\n\n <br>\n\n\n <p>We do not sell, license, rent, or otherwise provide your Personal Information to unaffiliated third-parties (parties outside the T-Mobile corporate family) to market their services or products to you without your consent. We may, however, disclose your information to unaffiliated third-parties as follows:</p>\n\n <br>\n <strong>With Your Consent</strong>\n\n <p>We may disclose Personal Information about you to third-parties with your consent. We may obtain your consent in writing; online, through "click-through" agreements; when you accept the terms of disclosures on your phone for certain applications or services; orally, in our stores or on the phone, including through interactive voice response, or implicitly, for example, when you purchase a product and ask that it be shipped to your home, consenting to our disclosure of your name and address to a third-party shipping company to complete delivery.</p>\n <strong>To the Primary Account Holder</strong>\n\n <p>We may disclose information about an account user to the primary account holder (the party financially responsible for the account). If a business, governmental agency, or other individual obtains service for you, that entity or individual is our customer, and we may provide information about you or your use of the service, products or devices to them or others at their direction.</p>\n\n <p>When you are the primary account holder, but you receive special or discounted pricing, terms, or other benefits through another party\x92s agreement with us (for example, an employee discount), we may provide enough information to that party to verify your initial and continuing eligibility for benefits under their agreement with us and to calculate any associated discounts.</p>\n <strong>To Our Service Providers</strong>\n\n <p>We may disclose information to third-party vendors and partners who complete transactions or perform services on our behalf (for example, credit/debit card processing, billing, shipping, repair, customer service, auditing, and marketing).</p>\n <strong>Third-Party Carriers and Suppliers</strong>\n\n <p>If you are roaming on the network of another carrier or WiFi service provider, your wireless telephone number, your location, the numbers you dial, and other information about your usage will be available to that carrier to facilitate that service. Additionally, services and functionality offered through certain devices are sometimes provided in conjunction with entities other than T-Mobile. As a result, Personal Information from your devices may be uploaded and stored on their servers. For instance, BlackBerry\xae service is provided in conjunction with Research in Motion (RIM), and Personal Information from your device is stored on their BlackBerry Enterprise ServersTM. Their specific terms and conditions, terms of use, and privacy polices apply to those services.</p>\n <strong>In a Business Transfer</strong>\n\n <p>We may sell, disclose, or transfer information about you as part of a corporate business transaction, such as a merger or acquisition, joint venture, corporate reorganization, financing, or sale of company assets, or in the unlikely event of insolvency, bankruptcy, or receivership, in which such information could be transferred to third-parties as a business asset in the transaction. We may also share information with banks for purposes of transferring loans in connection with your device financing.</p>\n <strong>For Legal Process &amp; Protection</strong>\n\n <p>We may disclose Personal Information, and other information about you, or your communications, where we have a good faith belief that access, use, preservation or disclosure of such information is reasonably necessary:</p>\n\n <ul>\n <li>To satisfy any applicable law, regulation, legal process or enforceable governmental request;</li>\n\n <li>To enforce or apply agreements, or initiate, render, bill, and collect for services and products (including to collection agencies in order to obtain payment for our products and services);</li>\n\n <li>To protect our rights or interests, property or safety or that of others;</li>\n\n <li>In connection with claims, disputes, or litigation \x96 in court or elsewhere;</li>\n\n <li>To protect users of our services and other carriers or providers from fraudulent, abusive, or unlawful use of, or subscription to, such services;</li>\n\n <li>When information is reported to the Spam Reporting Service, it may be shared with government agencies and others that work to combat spam and prevent fraudulent, deceptive, and unfair practices;</li>\n\n <li>To facilitate or verify the appropriate calculation of taxes, fees, or other obligations due to a local, state, or federal government; or</li>\n\n <li>In an emergency situation.</li>\n </ul>\n <strong>Co-Sponsored Websites and Partners</strong>\n\n <p>If you provide information to us in connection with a co-sponsored website, this Policy will apply to our use of the information and the co-sponsor\x92s policy will apply to their use of the information. If you purchase equipment or activate service at one of our partner\x92s locations (including websites of such dealer or retailer), they may request information from you that is passed to us as part of the activation process, but which may also be retained by the partner. This Policy will govern our use of such information, and the partner\x92s privacy policy will govern its use of such information.</p>\n <strong>De-Identified Information</strong>\n\n <p>We may provide information that does not identify you personally to third-parties for marketing, advertising or other purposes.</p>\n <p>For more information about our INSIGHTS Program see <a href="/Company/PrivacyResources.aspx?tp=Abt_Tab_YourPrivacychoices&amp;tsp=Abt_Sub_TmobileInsights">Privacy Resources/T-Mobile INSIGHTS</a></p>\n <strong>Third-Party Applications for Your Devices</strong>\n\n <p>We are not responsible for the third-party applications (for example, applications, programs, widgets, etc.) you select and install on your device. When you install third party applications, you may give your consent for the third party to access information stored on the device and on our network to facilitate the application\x92s functions (for example, you may consent to third-party access to your location information \x96 see Location Based Services). The manner in which such third-parties may use, share, or disclose such information is governed by the terms and conditions and privacy policy provided by that third party \x96 not by this Policy. For more information, see <a href="/Company/PrivacyResources.aspx?tp=Abt_Tab_ThirdParty">Privacy Resources/Device Apps</a></p>\n\n <br>\n </div>\n\n <div class="faqitem">\n <div class="header">\n <a class="icon" id="A4" href="#top" name="collectionuse">\n <img title="Up" height="14" src="https://s.tmocache.com/images/arrowup.gif" width="14" border="0">top</a><b>HOW WE STORE AND PROTECT THE INFORMATION COLLECTED ABOUT YOU</b>\n </div>\n <strong>Protecting Your Information</strong>\n\n <p>We use a variety of physical, electronic, and procedural safeguards to protect Personal Information from unauthorized access, use, or disclosure while it is under our control.</p>\n\n <p>We provide password protected online access to your account information through my.t-mobile.com. For multi-line accounts, the primary account holder is authorized to access online account information for all the devices and lines on the account. Other users may generally access online account information related only to their respective device and line (for example, if a parent provides a device to their child, the child may access online information about that device and line\x96 including CPNI). The primary account holder, however, may designate additional or more limited access rights for other users on the account.</p>\n\n <p>Under federal law, you have a right, and we have a duty, to protect the confidentiality of CPNI and we have adopted policies and procedures designed to ensure compliance with those rules. We will not intentionally disclose your CPNI to third-parties without your permission, except as allowed under FCC rules, applicable law, or explained in this Policy. However, if you are the primary account holder, you may designate other "authorized users" (for example, a spouse) to access and manage your account information, including CPNI. For more information see <a href="/Company/PrivacyResources.aspx?tp=Abt_Tab_CPNI">Privacy Resources/Customer Proprietary Network Information</a></p>\n <strong>Retention and Disposal</strong>\n\n <p>We retain information only for as long as we have a business or tax need or as applicable laws, regulations, or government orders require. When we dispose of Personal Information, we use reasonable procedures designed to erase or render it unreadable (for example, shredding documents and wiping electronic media).</p>\n </div>\n\n <div class="faqitem">\n <div class="header">\n <a class="icon" id="A5" href="#top" name="collectionuse">\n <img title="Up" height="14" src="https://s.tmocache.com/images/arrowup.gif" width="14" border="0">top</a><b>HOW YOU CAN UPDATE YOUR INFORMATION AND CHOOSE HOW WE CONTACT YOU</b>\n </div>\n\n <br>\n <strong>Access to Your Information</strong>\n\n <p>You may access and modify your contact information by visiting <a href="https://my.t-mobile.com">my.t-mobile.com</a> or a T-Mobile retail store, or by contacting Customer Service. You may also contact us using the information in the <a href="#contactus">How to Contact Us</a> section below.</p>\n <strong id="infochoices">Choices Regarding Use of Your Information</strong>\n\n <p>We may send you communications about services or products we, or our partners, sell. We want to provide you with meaningful choices regarding our marketing communications, and you may choose to limit or opt-out of some marketing communications from us at any time. Although you may elect not to receive marketing information from us, if you subscribe to our services or buy our products, you will continue to receive invoices, customer-service and transactional notices, and similar communications. The Primary Account Holder can configure options for marketing communications for all lines on the account.</p>\n\n <p>If you are a T-Mobile customer and you manage your account online, you can manage your preferences regarding marketing communications by logging into your <a href="https://my.t-mobile.com">my.t-mobile.com</a> profile. If you do not manage your account online, or you are not a current T-Mobile customer, you may manage your preferences regarding marketing communications <a href="/company/website/OptOut.aspx?type=1">here</a>.</p>\n\n <p>You may also manage your preferences regarding marketing communications by contacting Customer Service by dialing 611 from your T-Mobile phone or <span class="tmo_tfn_number">1-800-937-8997</span> from any phone, or, with respect to marketing e-mails, by following the "unsubscribe" instructions on any marketing e-mail we send you.</p>\n\n <p>See also <a href="/Company/PrivacyResources.aspx?tp=Abt_Tab_DoNotCallPolicy">Privacy Resources/Marketing Choice</a></p>\n <strong>Do Not Call Registry</strong>\n\n <p>The FTC maintains a National Do Not Call Registry at <a href="https://www.donotcall.gov/">https://www.donotcall.gov/</a>, and your state may maintain its own Do Not Call Registry. Putting your number on these Registries also may limit our telemarketing calls to that number.</p>\n\n <br>\n </div>\n\n <div class="faqitem">\n <div class="header">\n <a class="icon" id="A6" href="#top" name="collectionuse">\n <img title="Up" height="14" src="https://s.tmocache.com/images/arrowup.gif" width="14" border="0">top</a><b>YOUR ROLE IN PROTECTING YOUR PRIVACY</b>\n </div>\n\n <p>You play an important role in ensuring the security of Personal Information. We encourage you to use safeguards to protect your information and devices. For more information please see <a href="/Company/PrivacyResources.aspx?tp=Abt_Tab_Resources">Privacy Resources/Protecting Your Privacy</a>.</p>\n\n <br>\n </div>\n\n <div class="faqitem">\n <div class="header">\n <a class="icon" id="A7" href="#top" name="collectionuse">\n <img title="Up" height="14" src="https://s.tmocache.com/images/arrowup.gif" width="14" border="0">top</a><b>OTHER INFORMATION YOU SHOULD KNOW</b>\n </div>\n <strong>Consumer Code for Wireless Service</strong>\n\n <p>We follow the <a href="http://www.ctia.org/policy-initiatives/voluntary-guidelines/consumer-code-for-wireless-service">Consumer Code for Wireless Service</a> established by the Cellular Telecommunications &amp; Internet Association ("CTIA"). In doing so, we want to help customers understand their bills, receive quality service, and make informed choices and conform our information practices under this Policy to meet the requirements of applicable federal and state laws and regulations.</p>\n <strong>Your California Privacy Rights</strong>\n\n <p>California Civil Code Section 1798 entitles California customers to request information concerning whether a business has disclosed Personal Information to any third parties for the third parties\x92 direct marketing purposes. As stated in this Policy, we will not sell or share your Personal Information with non-affiliated companies for their direct marketing purposes without your consent. California customers who wish to request further information about our compliance with this law or have questions or concerns about our privacy practices and policies may contact us as specified in the <a href="#contactus">How to Contact Us</a> section below.</p>\n\n <br>\n </div>\n\n <div class="faqitem">\n <div class="header">\n <a class="icon" id="A8" href="#top" name="collectionuse">\n <img title="Up" height="14" src="https://s.tmocache.com/images/arrowup.gif" width="14" border="0">top</a><b>PRIVACY POLICY UPDATES AND CONTACT INFORMATION</b>\n </div>\n <strong>How We Communicate Changes to This Policy</strong>\n\n <p>We may update this Policy at any time to provide updates to or clarification of our practices. If we make changes, we will revise the date at the top of the Policy. If we propose to use Personal Information in a materially different way, we will provide you with notice by posting notice of the changes on our website for at least 30 days before we implement those changes, and obtain your consent as specified above for any material change regarding disclosure of Personal Information. You should refer to this Policy often for the latest information and the effective date of any changes.</p>\n <strong>How to Contact Us</strong>\n\n <p>If you have any questions or comments about this Policy or about T-Mobile\'s privacy practices, please call Customer Service at 611 (from a T-Mobile phone) or <span class="tmo_tfn_number">1-800-937-8997</span> (from any phone) or send an e-mail message to <a href="mailto:privacy@t-mobile.com">privacy@t-mobile.com.</a> You may also direct your privacy-related comments or questions to the address below:</p>\n\n <div id="contactus">\n <br>\n T-Mobile USA, Inc.\n <br>\n Attn: Chief Privacy Officer\n <br>\n 12920 SE 38th Street\n <br>\n Bellevue, Washington 98006\n <br>\n <br>\n <br>\n </div>\n </div>\n</div>'} DEBUG:policies:in handle response 2017-02-26 16:56:17 [policies] DEBUG: in handle response DEBUG:policies:wroten log ok /app/log/2017-02-26T16-56-16_ok_url.log 2017-02-26 16:56:17 [policies] DEBUG: wroten log ok /app/log/2017-02-26T16-56-16_ok_url.log DEBUG:page_watcher_scraper.util:{'item': 'www.t-mobile.com_Templates_Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditions&amp;print=true', 'name': 'policies', 'time': '2017-02-26T16-56-17'} 2017-02-26 16:56:17 [page_watcher_scraper.util] DEBUG: {'item': 'www.t-mobile.com_Templates_Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditions&amp;print=true', 'name': 'policies', 'time': '2017-02-26T16-56-17'} DEBUG:page_watcher_scraper.util:saving html /app/html/2017-02-26T16-56-17-policies-www.t-mobile.com_Templates_Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditions&amp;print=true.html 2017-02-26 16:56:17 [page_watcher_scraper.util] DEBUG: saving html /app/html/2017-02-26T16-56-17-policies-www.t-mobile.com_Templates_Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditions&amp;print=true.html DEBUG:page_watcher_scraper.pipelines:writing policy to file /app/page-watcher-data/t-mobile/gsm/tos.txt 2017-02-26 16:56:17 [page_watcher_scraper.pipelines] DEBUG: writing policy to file /app/page-watcher-data/t-mobile/gsm/tos.txt DEBUG:scrapy.core.scraper:Scraped from <200 https://www.t-mobile.com/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditions&amp;print=true> {'content': u'<div id="body" style="text-align:left">\r\n\t\t\t\t<div>\r\n\t\t\t\t\t<div class="print"></div>\r\n\t\t\t\t\t<br>\r\n\t\t\t\t</div>\r\n\t\t\t\t\r\n\t\t\t\t\t<div><p>Did you activate (or renew) service prior to September 1, 2016? If yes, please click the date for the applicable version of the Terms and Conditions: <a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsMar2016&amp;print=true">March 17, 2016 </a> | <a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsFeb2016&amp;print=true">February 17, 2016 </a> | <a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsJan2016&amp;print=true">January 25, 2016 </a>| <a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsNov2015&amp;print=true">November 14, 2015</a> | <a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsJune2015&amp;print=true">June12, 2015</a> | <a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsMar2015&amp;print=true">March 18, 2015</a> |<a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsNov2014&amp;print=true">November 10, 2014</a> |<a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsMar2014&amp;print=true">March 27, 2014</a> |<a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsOct2013&amp;print=true">October 20, 2013</a> |<a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsDec2013&amp;print=true">December 30, 2011</a> |<a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsJuly2011&amp;print=true">July 24, 2011</a> |<a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsJuly&amp;print=true">July 18, 2010</a> |<a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditions2008&amp;print=true">June 28, 2008</a> | <a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditions2004&amp;print=true">December 2004</a></p>\n\n<p style="TEXT-ALIGN: center"><strong>T-Mobile Terms &amp; Conditions</strong></p>\n\n<p style="TEXT-ALIGN: center">Effective as of September 1, 2016</p>\n\n<p>Thanks for choosing T-Mobile. Please read these Terms &amp; Conditions (\x93T&amp;Cs\x94), which contain important information about your relationship with T-Mobile, including mandatory arbitration of disputes between us, instead of class actions or jury trials. You will become bound by these provisions once you accept these T&amp;Cs.</p>\n\n<p><strong>WHO IS THIS AGREEMENT WITH?</strong></p>\n\n<p>These T&amp;Cs are an agreement between you and us, T-Mobile USA, Inc., and our controlled subsidiaries, assignees, and agents.</p>\n\n<p><strong>HOW DO I ACCEPT THESE T&amp;Cs?</strong></p>\n\n<p>You accept these T&amp;Cs by doing any of the following things:</p>\n\n<ul>\n <li>giving us a written or electronic signature or confirmation, or telling us orally that you accept;</li>\n\n <li>activating, using or paying for the Service or a Device; or</li>\n\n <li>opening the Device box.</li>\n</ul>\n\n<p>If you don\x92t want to accept these T&amp;Cs, don\x92t do any of these things.</p>\n\n<p>When you accept, you\'re telling us that you are of legal age (which means you are either legally emancipated, or have reached the age of majority as defined in your jurisdiction) and that you are able to enter into a contract. If you accept for an organization, you\'re telling us that you are authorized to bind that organization, and references to "you" in these T&amp;Cs may mean the organization.</p>\n\n<p><strong>WHAT IS INCLUDED IN THESE TERMS AND CONDITIONS?</strong></p>\n\n<p>In these T&amp;Cs, you\'ll find important information about:</p>\n\n<ul>\n <li>T-Mobile services provided to you (\x93Services\x94);</li>\n\n <li>Any equipment for which we provide Service, such as a phone, handset, tablet, or SIM card (collectively, a \x93Device\x94);</li>\n\n <li>Any charges, taxes, fees, and other amounts we bill you or that were accepted or processed through your Device (\x93Charges\x94);</li>\n\n <li>Privacy information;</li>\n\n <li>Network management practices;</li>\n\n <li>Limitations of liability; and</li>\n\n <li>Resolution of disputes by arbitration and class action waiver (full terms available <a href="#Dispute%20Resolution">here</a>).</li>\n</ul>\n\n<p><strong>ARE THERE ANY OTHER TERMS THAT APPLY TO ME?</strong></p>\n\n<p>Yes. Your \x93Agreement\x94 includes these T&amp;Cs, the additional terms found in your Rate Plan, your Data Plan, your Service Agreement, and provisions linked to from these T&amp;Cs. Sections marked \x93*\x94 continue after termination of our Agreement with you.</p>\n\n<p>You should also be aware that our <a style="TEXT-DECORATION: none" href="http://www.t-mobile.com/company/website/privacypolicy.aspx" target="_blank">Privacy Policy</a> and <a style="TEXT-DECORATION: none" href="http://www.T-Mobile.com/OpenInternet" target="_blank">Open Internet Policy</a> apply to the use of our products and services.</p>\n\n<p>You might also have other agreements with us, such as an equipment installment plan or JUMP! On Demand Lease Agreement.</p>\n\n<p><strong>*HOW DO I RESOLVE DISPUTES WITH T-MOBILE?</strong></p>\n\n<p>By accepting these T&amp;Cs, you are agreeing to resolve any dispute with us through binding arbitration (unless you opt out) or small claims dispute procedures, and to waive your rights to a class action suit and jury trial. Your complete arbitration agreement, including opt-out instructions, is available <a href="#Dispute%20Resolution">here</a>, and the opt-out website is available <a href="https://www.t-mobiledisputeresolution.com/" target="_blank">here</a>. For additional terms and conditions governing a dispute between us, including how to dispute Charges assessed to you on your bill, choice of law, disclaimers of certain warranties, limitations of liabilities, and your indemnification obligations, <a href="#OTRDR">click here</a>.</p>\n\n<p><strong>WHAT IS A RATE PLAN?</strong></p>\n\n<p>Your \x93Rate Plan\x94 includes your Service allotments, for example, for minutes, messages or data, rates, coverage and other terms. You can check your current usage by visiting my.T-mobile.com, using the T-Mobile My Account app, or by using a short code from your Device (you can find more information about the short code at www.t-mobile.com). If any term in your Rate Plan conflicts with these T&amp;Cs, the term in your Rate Plan governs.</p>\n\n<p><strong>HOW WILL I BE CHARGED FOR DATA USAGE?</strong></p>\n\n<p>Data service may be included in your Rate Plan or data pass or you may be charged for data usage on a pay per use basis (\x93Data Plan\x94). Your Rate Plan and/or Data Plan will contain more information about how we calculate data usage. You can check your current usage by visiting my.T-mobile.com, using the T-Mobile My Account app, or by using a short code from your device (you can find more information about the short code at www.t-mobile.com). If you do not have a Data Plan, your Device may not be able to access data services.</p>\n\n<p><strong>ARE THERE SEPARATE TERMS FOR PREPAID CUSTOMERS?</strong></p>\n\n<p>The terms of these T&amp;Cs apply to prepaid customers, and additional terms specific to prepaid customers may be <a href="#Additional%20Terms%20for%20Prepaid%20Customers">found here</a>.</p>\n\n<p><strong>HOW DO I GIVE OTHER PEOPLE ACCESS TO MY ACCOUNT?</strong></p>\n\n<p>If you want someone else to be able to access and manage your account, you can establish them as an \x93Authorized User,\x94 so they can:</p>\n\n<ul type="disc">\n <li>Make changes to your account;</li>\n\n <li>Add or remove services or features to your account;</li>\n\n <li>Receive notices and disclosures on your behalf;</li>\n\n <li>Purchase Devices for use with our Service, including under an installment plan; and</li>\n\n <li>Incur Charges on your account.</li>\n</ul>\n\n<p>The easiest way to designate an Authorized User is through your my.T-mobile.com account. Keep in mind that you should not share your account validation information, which includes the last four digits of your social security number or your passcode. This information is sensitive so take steps to protect it. We will treat presentation of the proper account validation information as authorized access to an account.</p>\n\n<p><strong>WHERE, HOW, AND WHEN DOES MY SERVICE WORK?</strong></p>\n\n<p>These T&amp;Cs describe the experience you can expect on our network, including information about our reasonable network management practices, and the experience on our roaming partners\x92 networks:</p>\n\n<ul>\n <li>Please check our coverage maps, which approximate our anticipated coverage area outdoors. Your experience on our network may vary and change without notice depending on a variety of factors. For more information, <a href="#UsingOurNetwork">click here</a>. You agree that we are not liable for problems relating to Service availability or quality.</li>\n\n <li>For more information about roaming, <a href="#Roaming">click here</a>.</li>\n\n <li>To provide the best possible experience for the most possible customers, we prioritize the data usage of a small percentage of our data customers who use the highest amount of data (as of 10/28/16, more than 28GB) below that of other customers in times and locations where there are competing customer demands for network resources. We also prioritize smartphone and mobile internet (tablet) over Smartphone Mobile HotSpot (tethering) traffic on our network. <a href="#UsingOurNetwork">Click here</a> for more information.</li>\n\n <li>We utilize streaming video optimization technology in our network on qualifying Rate Plans, which helps to minimize data consumption, while also improving the service experience for all customers. Some Rate Plans have video optimization via the Binge On feature. Some qualifying video providers may choose to opt-out of the Binge On program, see listing at <a href="http://www.t-mobile.com/offer/binge-on-streaming-video.html#" target="_blank">http://www.t-mobile.com/offer/binge-on-streaming-video.html#</a>. The Binge On optimization technology is not applied to the video services of these providers; video from these services will stream at native resolution, and high-speed data consumption will continue as if Binge On were not enabled.</li>\n\n <li>Additionally, we may implement other network practices, such as caching less data.</li>\n\n <li>Our <a style="TEXT-DECORATION: none" href="http://www.T-Mobile.com/OpenInternet" target="_blank">Open Internet Policy</a> includes important information on these topics as well as information on commercial terms, performance characteristics (such as expected speed, latency) and network practices.</li>\n</ul>\n\n<p><strong>*WHAT ARE THE PERMITTED AND PROHIBITED USES FOR MY DEVICE AND THE SERVICE?</strong></p>\n\n<p>Our wireless network is a shared resource, which we manage for the benefit of all of our customers. Your Data Plan is intended for Web browsing, messaging, and similar activities. Certain activities and uses of our Services and your Device are permitted and others are not. For examples of permitted and prohibited uses, <a href="#EPPUSYD">click here</a>. If you buy, lease, or finance a Device manufactured for use on our network, you agree, and we rely on your agreement, that you intend it to be activated on our Service and will not resell or modify the Device, or assist anyone doing so.</p>\n\n<p><strong>*WHAT HAPPENS IF MY DEVICE IS LOST OR STOLEN?</strong></p>\n\n<p>You agree to notify us if your Device is lost or stolen. Once you notify us, we will suspend your Service. <a href="#Lost%20or%20Stolen">Click here</a> to learn more about how we handle Charges that are incurred after you report that your Device is lost or stolen.</p>\n\n<p><a id="internationalServices" name="internationalServices"></a><a id="internationalLongDistance" name="internationalLongDistance"></a><a id="internationalLongDistanceTextPictureVide" name="internationalLongDistanceTextPictureVide"></a><a id="internationalRoaming" name="internationalRoaming"></a><a id="internationalData" name="internationalData"></a><a id="dataGlobalAddOnsAndGlobalMessagingPlans" name="dataGlobalAddOnsAndGlobalMessagingPlans"></a><a id="cruiseShipRoaming" name="cruiseShipRoaming"></a><a id="internationalMiscellaneous" name="internationalMiscellaneous"></a><strong>*HOW WILL I BE BILLED FOR USE OF THE SERVICES?</strong></p>\n\n<p>You agree to pay all Charges we assess and bill you or that were accepted or processed through all Devices on your account. You may have to pay extra for calls to some numbers (e.g. conference &amp; chat lines, broadcast, international, 900 or 976 calls, etc.). You agree to provide us with accurate and complete billing and tax related information and to report all changes within 30 days of the change. You will receive an electronic (paperless) bill unless you tell us you want a paper bill. You have the option of switching to a paper bill at no cost to you by changing your billing preferences at My T-Mobile, using the T-Mobile My Account app, or by contacting Customer Care. For more information about paperless billing, please visit <a style="TEXT-DECORATION: none" href="http://www.t-mobile.com/billterms" target="_blank">www.t-mobile.com/billterms</a>.</p>\n\n<p>Your Device can be used to purchase services and products from third parties, and Charges for these purchases may be included on your T-Mobile bill. For no additional cost you can block third party charges from being included on your T-Mobile bill by logging into your account at www.my.T-Mobile.com or calling Customer Care. For more information about billing, <a href="#Billing%20Information">click here</a>.</p>\n\n<p><a id="textInstantMsgPicVidMsg" name="textInstantMsgPicVidMsg"></a><strong>WHAT IF I DON\x92T PAY ON TIME?</strong></p>\n\n<p>We may charge a late fee of the greater of 1.5% per month (18% annually) or $5 per month and a returned payment fee up to $35, subject to the maximum allowed by law. We may use a collection agency to collect past due balances and you agree to pay collection agency fees. If we accept late or partial payments, you still must pay us the full amount you owe, including late fees. We will not honor limiting notations you make on or with your checks. Late payment, non-payment or collection agency fees are liquidated damages intended to be a reasonable advance estimate of our costs resulting from late payments and non-payments by our customers; these costs are not readily ascertainable and are difficult to predict or calculate at the time that these fees are set.</p>\n\n<p><strong>*DOES T-MOBILE CHECK MY CREDIT?</strong></p>\n\n<p>Yes, for many of our products and services. We may get information about your credit history from credit-reporting agencies, which may affect your credit rating. We may also report your payment record to credit-reporting agencies.</p>\n\n<p><strong>AM I REQUIRED TO MAKE A DEPOSIT?</strong></p>\n\n<p>We may require you to make a deposit or prepayment for Services. We can apply deposits, payments, or prepayments in any order to any amounts you owe us on any account. This deposit is refundable, and will be applied as a credit to your account along with interest as may be required by law.</p>\n\n<p><strong>CAN T-MOBILE ACCESS MY DEVICE?</strong></p>\n\n<p>We may remotely change software, systems, applications, features or programming on your Device without notice. These changes will modify your Device and may affect or erase data you have stored on your Device, the way you have programmed your Device, or the way you use your Device. You will not be able to use your Device during the installation of the changes, even for emergencies.</p>\n\n<p><strong>CAN I DOWNLOAD AND USE THIRD PARTY CONTENT AND APPS ON MY DEVICE?</strong></p>\n\n<p>Yes. You are free to download and use content or applications (\x93Content &amp; Apps\x94) on your Device that are not provided by T-Mobile, at your own risk. Third party Content &amp; Apps may require your agreement to a license or other terms with the third party. Some Devices or Content &amp; Apps may contact our network without your knowledge, which may result in additional Charges (e.g., while roaming internationally).</p>\n\n<p><strong>*LICENSE</strong></p>\n\n<p>Your Device\x92s Software is licensed, not sold, to you by T-Mobile and/or other licenso rs for your personal, lawful, non-commercial use on your Device only. You may only use the Software as authorized by its license. Your Device\x92s \x93Software\x94 includes its software, interfaces, documentation, data, and Content &amp; Apps, as each may be updated or replaced by feature enhancements or other updates. For additional information regarding these license terms, including restrictions on your use of the Software, please <a href="#License">click here</a>.</p>\n\n<p><strong>*WHAT IS THE TERM OF THESE T&amp;Cs?</strong></p>\n\n<p>As the Un-Carrier, we did away with annual service contracts. You are free to go, although we\x92d be sad to see you leave. You are responsible for all Charges incurred through the end of your Service term. In addition, cancellation of Service may affect other agreements that you have with us, including equipment installment plans or lease agreements where some of your payments may be accelerated upon cancellation.</p>\n\n<p><strong>CAN T-MOBILE CHANGE OR TERMINATE MY SERVICES OR THIS AGREEMENT?</strong></p>\n\n<p>Yes. Except as described below for Rate Plans with the price-lock guarantee, we may change, limit, suspend or terminate your Service or this Agreement at any time, including if you engage in any of the prohibited uses described <a href="#EPPUSYD">here</a> or no longer reside in a T-Mobile-owned network coverage area. Under certain limited circumstances, we may also block your device from working on our network. If the change to your Service or Rate Plan will have a material adverse effect on you, we will provide 14 days\x92 notice of the change. You\x92ll agree to any change by using your Service after the effectiveness of the change. We may exclude certain types of calls, messages or sessions (e.g. conference and chat lines, broadcast, international, 900 or 976 calls, etc.), in our sole discretion, without further notice.</p>\n\n<p>If you are on a price-lock guaranteed Rate Plan, we will not increase your monthly recurring Service charge (\x93Recurring Charge\x94) for the period that applies to your Rate Plan, or, if no specific period applies, for as long as you continuously remain a customer in good standing on a qualifying Rate Plan. If you switch plans, the price-lock guarantee for your new Rate Plan will apply (if there is one). The price-lock guarantee does not include taxes, surcharges, fees, or charges for extra features or Devices. If your Service or account is limited, suspended or terminated and then reinstated, you may be charged a reactivation fee. For information about our unlocking policy, <a style="TEXT-DECORATION: none" href="http://www.t-mobile.com/Company/CompanyInfo.aspx?tp=Abt_Tab_CompanySimUnlockPolicy&amp;link=unav" target="_blank">click here</a>.</p>\n\n<p><strong>*YOUR CONSENT TO BE CONTACTED</strong></p>\n\n<p>We may contact you without charge, on any wireless telephone number assigned to your account for any purpose, including marketing messages, and in any manner permitted by law. You also expressly consent to be contacted by us, and anyone contacting you on our behalf, for any purpose, including billing, collection, or other account or service related purpose, at any telephone number or physical or electronic address where you may be reached, including any wireless telephone number. You agree that T-Mobile, and anyone contacting you on our behalf, may communicate with you in any manner, including using a pre-recorded or artificial voice, or using an automatic telephone dialing system to place calls or send messages, alerts, or an automatic e-mail system to deliver email messages. If a contact number you have provided to us is no longer your number, you agree to notify us promptly that you can no longer be reached at that number. You represent that you have received, and are authorized to convey to us, the consent of any authorized users on your account to be contacted by us as described in this Section. You agree that all consents provided in this Section will survive cancellation of your Service and account.</p>\n\n<p><strong>HOW DO WE NOTIFY EACH OTHER?</strong></p>\n\n<p>You may contact us at www.T-Mobile.com, by calling <span class="tmo_tfn_number">1-877-453-1304</span> or 611 from your Device, or by writing to: T-Mobile Customer Relations, P.O. Box 37380, Albuquerque, NM 87176-7380. <strong>Puerto Rico customers</strong> contact us at: T-Mobile Customer Relations, 654 Mu\xf1\xf2z Rivera Avenue, Suite 2000, Hato Rey, Puerto Rico 00918, Attn: Customer Care Manager. Electronic notices are considered delivered when sent. Mail notices are considered delivered 3 days after mailing. For multi-line accounts, we may assign a \x93Primary Telephone Number\x94 to your account for the purpose of receiving notices, as well as for other purposes. If you would like to change it, contact us.</p>\n\n<p>To begin arbitration or other legal proceeding, you must serve our registered agent. Our registered agent is Corporation Service Company and can be contacted at <span class="tmo_tfn_number">1-866-403-5272</span>. For <strong>Puerto Rico customers</strong>, our registered agent is The Prentice-Hall Corporation System, Puerto Rico, Inc. and can be contacted at FGR Corporate Services, Inc., Oriental Bank Building, Suite P-1, 254, Mu\xf1oz Rivera Avenue, San Juan, Puerto Rico, 00918, phone: 1-800-927-9801.</p>\n\n<p><strong>EMERGENCY ALERTS</strong></p>\n\n<p>We have chosen to offer wireless emergency alerts, within portions of its coverage area, on wireless alert capable Devices. There is no additional charge for these wireless emergency alerts. For details visit <a href="http://www.t-mobile.com/Company/CompanyInfo.aspx?tp=Abt_Tab_CompanySafety&amp;tsp=Abt_Sub_WirelessEmergencyAlerts">http://www.t-mobile.com/Company/CompanyInfo.aspx?tp=Abt_Tab_CompanySafety&amp;tsp=Abt_Sub_WirelessEmergencyAlerts</a> .</p>\n\n<p><strong>*WHAT ELSE DO I NEED TO KNOW?</strong></p>\n\n<p><a href="#Additional%20Terms">Click here</a> for additional terms that apply to you.</p>\n\n<br clear="all">\n\n<p style="TEXT-ALIGN: center"><a id="Dispute Resolution" name="Dispute%20Resolution"></a><strong>Dispute Resolution</strong></p>\n\n<p><strong>*HOW DO I RESOLVE DISPUTES WITH T-MOBILE?</strong></p>\n\n<p><strong>Dispute Resolution and Arbitration. YOU AND WE EACH AGREE THAT, EXCEPT AS PROVIDED BELOW (AND EXCEPT AS TO PUERTO RICO CUSTOMERS), ANY AND ALL CLAIMS OR DISPUTES IN ANY WAY RELATED TO OR CONCERNING THE AGREEMENT, OUR PRIVACY POLICY, OUR SERVICES, DEVICES OR PRODUCTS, INCLUDING ANY BILLING DISPUTES, WILL BE RESOLVED BY BINDING ARBITRATION OR IN SMALL CLAIMS COURT</strong> . This includes any claims against other parties relating to Services or Devices provided or billed to you (such as our suppliers, dealers, authorized retailers, or third party vendors) whenever you also assert claims against us in the same proceeding. You and we each also agree that the Agreement affects interstate commerce so that the Federal Arbitration Act and federal arbitration law, not state law, apply and govern the enforceability of this dispute resolution provision (despite the general choice of law provision set forth below). THERE IS NO JUDGE OR JURY IN ARBITRATION, AND COURT REVIEW OF AN ARBITRATION AWARD IS LIMITED. THE ARBITRATOR MUST FOLLOW THIS AGREEMENT AND CAN AWARD THE SAME DAMAGES AND RELIEF AS A COURT (INCLUDING ATTORNEYS\x92 FEES).</p>\n\n<p>Notwithstanding the above, <strong>YOU MAY CHOOSE TO PURSUE YOUR CLAIM IN COURT AND NOT BY ARBITRATION IF YOU OPT OUT OF THESE ARBITRATION PROCEDURES <u>WITHIN 30 DAYS</u> FROM THE EARLIER OF THE DATE YOU PURCHASED A DEVICE FROM US OR THE DATE YOU ACTIVATED A NEW LINE OF SERVICE (the \x93Opt Out Deadline\x94)</strong> . You must opt out by the Opt Out Deadline for each line of Service. You may opt out of these arbitration procedures by calling <span class="tmo_tfn_number">1-866-323-4405</span> or online at <a style="TEXT-DECORATION: none" href="http://www.T-Mobiledisputeresolution.com" target="_blank">www.T-Mobiledisputeresolution.com</a> <strong>Any opt-out received after the Opt Out Deadline will not be valid and you must pursue your claim in arbitration or small claims court.</strong></p>\n\n<p>For all disputes (except for Puerto Rico customers), whether pursued in court or arbitration, you must first give us an opportunity to resolve your claim by sending a written description of your claim to the address provided in the \x93How Do We Send Notices to Each Other\x94 Section below. You and we each agree to negotiate your claim in good faith. If you and we are unable to resolve the claim within 60 days after we receive your claim description, you may pursue your claim in arbitration. You and we each agree that if you fail to timely pay amounts due, we may assign your account for collection, and the collection agency may pursue, in small claims court, claims limited strictly to the collection of the past due amounts and any interest or cost of collection permitted by law or this Agreement.</p>\n\n<p><strong>If the arbitration provision applies or you choose arbitration to resolve your disputes, then either you or we may start arbitration proceedings</strong> . You must send a letter requesting arbitration and describing your claim to our registered agent (see the \x93How Do We Send Notices to Each Other\x94 section below) to begin arbitration. The arbitration of all disputes will be administered by the American Arbitration Association ("AAA") under its Consumer Arbitration Rules in effect at the time the arbitration is commenced. The AAA rules are available at www.adr.org or by calling <span class="tmo_tfn_number">1-800-778-7879</span>. The arbitration of all disputes will be conducted by a single arbitrator, who shall be selected using the following procedure: (a) the AAA will send the parties a list of five candidates; (b) if the parties cannot agree on an arbitrator from that list, each party shall return its list to the AAA within 10 days, striking up to two candidates, and ranking the remaining candidates in order of preference; (c) AAA shall appoint as arbitrator the candidate with the highest aggregate ranking; and (d) if for any reason the appointment cannot be made according to this procedure, the AAA may exercise its discretion in appointing the arbitrator. Upon filing of the arbitration demand, we will pay or reimburse all filing, administration and arbitrator fees. An arbitrator may award on an individual basis any relief that would be available in a court, including injunctive or declaratory relief and attorneys\x92 fees. In addition, for claims under $75,000 as to which you provided notice and negotiated in good faith as required above before initiating arbitration, if the arbitrator finds that you are the prevailing party in the arbitration, you will be entitled to a recovery of reasonable attorneys\x92 fees and costs. Except for claims determined to be frivolous, we agree not to seek an award of attorneys\x92 fees in arbitration even if an award is otherwise available under applicable law. <strong>Puerto Rico customers</strong>: See below for details on the Puerto Rico Telecommunications Dispute Procedure.</p>\n\n<p><strong><u>CLASS ACTION WAIVER</u></strong> . <strong>YOU AND</strong> <strong>WE EACH AGREE THAT ANY PROCEEDINGS, WHETHER IN ARBITRATION OR COURT, WILL BE CONDUCTED ONLY ON AN INDIVIDUAL BASIS AND NOT IN A CLASS OR REPRESENTATIVE ACTION OR AS A MEMBER IN A CLASS, CONSOLIDATED OR REPRESENTATIVE ACTION</strong> . If a court or arbitrator determines in an action between you and us that this Class Action Waiver is unenforceable, the arbitration agreement will be void as to you. <strong>If you choose to pursue your claim in court by opting out of the arbitration provision as specified above, this Class Action Waiver provision will not apply to you. Neither you, nor any other customer, can be a class representative, class member, or otherwise participate in a class, consolidated, or representative proceeding without having complied with the opt out requirements above.</strong></p>\n\n<p><strong><u>JURY TRIAL WAIVER</u></strong> . If a claim proceeds in court rather than through arbitration, <strong>YOU AND</strong> <strong>WE EACH WAIVE ANY RIGHT TO A JURY TRIAL</strong>.</p>\n\n<p><strong><u>PUERTO RICO CUSTOMERS</u></strong> <strong>:</strong> We will provide you with a determination regarding any dispute you present to us within 15 days after we receive it. You will have 20 days from the mailing date of the notification to request a reconsideration of our determination. You may appeal our determination to the Telecommunications Board of the Commonwealth of Puerto Rico (\x93Telecommunications Board\x94) by filing a petition for review up to 30 days after the date of our determination. Your petition for review shall be made through the filing of a document containing the following information: (a) your name and address; (b) our company name; (c) the pertinent facts; (d) any applicable legal provisions that you are aware of; and (e) the remedy you are requesting. The document may be filed handwritten or typewritten, and must be signed by you. You must send us a copy of your document to the following address: 654 Mu\xf1oz Rivera Avenue, Suite 2000, Hato Rey, Puerto Rico 00918, Attn: Customer Care Manager. You must send your petition for review to the Puerto Rico Telecommunications Regulatory Board at the following address: 500 Ave. Roberto H. Todd (Pda. 18 \x96 Santurce), San Juan, Puerto Rico 00907-3941. The Telecommunications Board will review our determination only on appeal. You are advised of the provisions regarding suspension of Service that appear in Law 33 of July 7, 1985, Law 213 of September 12, 1996 and Regulations 8065 promulgated on August 31, 2011 by the Telecommunications Board regarding the procedures for customer\x92s dispute resolution and suspension of Services.</p>\n<strong>\n <br clear="all">\n</strong>\n\n<p style="TEXT-ALIGN: center"><a id="OTRDR" name="OTRDR"></a><strong>Other Terms Regarding Dispute Resolution</strong></p>\n\n<p><strong>*HOW CAN I DISPUTE MY CHARGES?</strong></p>\n\n<p>If you have any questions about your bill or want to dispute any Charges, please contact us by visiting www.T-Mobile.com, by calling <span class="tmo_tfn_number">800-937-8997</span> or 611 from your Device, or by writing to T-Mobile Customer Relations, P.O. Box 37380, Albuquerque, NM 87176-7380. If this does not fix things, please notify us in writing. Unless otherwise provided by law, you must notify us in writing of any dispute regarding your bill or Charges to your account within 60 days after the date you first receive the disputed bill or Charge. If you don\x92t, you may not pursue a claim in arbitration or in court. If you accept a credit, refund or other compensation or benefit to resolve a disputed bill or Charge, you agree that the issue is fully and finally resolved. Unless otherwise provided by law, you must pay disputed Charges until the dispute is resolved.</p>\n\n<p><strong>*CHOICE OF LAW</strong></p>\n\n<p>This Agreement is governed by the Federal Arbitration Act, applicable federal law, and the laws of the state in which your billing address in our records is located, without regard to the conflicts of laws rules of that state. Foreign laws (except for Puerto Rico) do not apply. Arbitration or court proceedings must be in: (a) the county and state in which your billing address in our records is located, but not outside the U.S.; or (b) in Puerto Rico if your billing address is in Puerto Rico. If any provision of the Agreement is invalid under the law of a particular jurisdiction, that provision will not apply in that jurisdiction.</p>\n\n<p><strong>*DISCLAIMER OF WARRANTIES</strong></p>\n\n<p><strong>Except for any written warranty that may be provided with a T-Mobile Device you purchase from us, and to the extent permitted by law, the Services and Devices are provided on an \x93as is\x94 and \x93with all faults\x94 basis and without warranties of any kind. We make no representations or warranties, express or implied, including any implied warranty of merchantability or fitness for a particular purpose concerning your Service or your Device. We can\x92t and don\x92t promise uninterrupted or error-free service and don\x92t authorize anyone to make any warr anties on our behalf. This doesn\x92t deprive you of any warranty rights you may have against anyone else. We do not guarantee that your communications will be private or secure; it is illegal for unauthorized people to intercept your communications, but such interceptions can occur.</strong></p>\n\n<p><strong>Services or Software provided by third parties (including voice applications), 911 or E911, text to 911, or other calling or messaging functionality, may work differently than services offered by us, or may not work at all. Please review all terms and conditions of such third party products.</strong> <strong>We are not responsible for failures to connect or complete 911 calls or text to 911 messages or if inaccurate location information is provided. 911 service may not be available or reliable and your ability to receive emergency services may be impeded</strong> . <strong>We cannot assure you that if you place a 911 call or text you will be found.</strong></p>\n\n<p><strong>We are not responsible for any download, installation, use, transmission failure, interruption, or delay related to Content &amp; Apps, or any third party content, services, advertisements, or websites you may be able to access by using your Device or the Services, even if charges for Content &amp; Apps appear on your T-Mobile bill.</strong> <strong>You are responsible for maintaining virus and other Internet security protections when accessing third party Content &amp; Apps or other services.</strong></p>\n\n<p><strong>*LIMITATION OF LIABILITY</strong></p>\n\n<p><strong>Unless prohibited by law, you and we each agree to limit claims for damages or other monetary relief against each other to direct and actual damages regardless of the theory of liability. This means that neither of us will seek any indirect, special, consequential, treble, or punitive damages from the other. This limitation and waiver also applies to any claims you may bring against any other party to the extent that we would be required to indemnify that party for such claim. You agree we are not liable for problems caused by you or a third party, or by any act of God.</strong> <strong>You also agree we aren\'t liable for missed or deleted voice mails or other messages, for any information (like pictures) that gets lost or deleted if we work on your Device, or for failure or delay in connecting a call or text to 911 or any other emergency service. Except to the extent prohibited by law, all claims must be brought within 2 years of the date the claim arises.</strong></p>\n\n<p><strong>*INDEMNIFICATION</strong></p>\n\n<p>You agree to defend, indemnify, and hold us and our directors, officers, and employees harmless from any claims arising out of use of the Service or Devices, breach of the Agreement, or violation of any laws or regulations or the rights of any third party by you, any person on your account or that you allow to use the Service or your Device.</p>\n\n<br clear="all">\n\n<p style="TEXT-ALIGN: center"><a id="Additional Terms for Prepaid Customers" name="Additional%20Terms%20for%20Prepaid%20Customers"></a><strong>Additional Terms for Prepaid Customers</strong></p>\n\n<p>Your T-Mobile prepaid Service account balance, if sufficient, or your active prepaid plan, gives you access to our prepaid Service for a limited amount of time; you must use your prepaid Service during the designated period of availability. To use our prepaid Service you must have a T-Mobile prepaid Service account balance for pay as you go service or be on an active prepaid plan. Service will be suspended when your account balance reaches zero and/or you are at the end of the time period associated with your prepaid plan. Monthly plan features are available for 30 days, however, depending on the time of day that you activate your Service or that your Service expires, your service cycle may not equal 30 full 24 hour days. Your monthly plan will automatically renew at the end of 30 days if you have a sufficient T-Mobile prepaid Service account balance to cover your prepaid Service plan before the first day after your service cycle. If you do not have a sufficient T-Mobile prepaid Service account balance, your prepaid Service will be suspended unless you move to a pay as you go plan. If you do not reinstate prepaid Service within the required period based upon your service plan, your phone number will be reallocated. The Charges for Service and the amount of time that Service is available following activation of your prepaid Service account balance may vary; see your Rate Plan for more information. Prepaid Service is non-refundable (even if returned during the Cancellation Period), and no refunds or other compensation will be given for unused airtime balances, lost or stolen prepaid cards, or coupons. You will not have access to detailed usage records or receive monthly bills. Coverage specific to our prepaid Service may be found at <a style="TEXT-DECORATION: none" href="http://prepaid-phones.t-mobile.com/prepaid-coverage" target="_blank">http://prepaid-phones.t-mobile.com/prepaid-coverage</a> and differs from coverage related to our postpaid Service.</p>\n\n<br clear="all">\n\n<p style="TEXT-ALIGN: center"><a id="UsingOurNetwork" name="UsingOurNetwork"></a><strong>Using Our Network</strong></p>\n\n<p><strong>WILL MY SERVICE VARY? WHAT FACTORS MAY AFFECT MY SERVICE?</strong></p>\n\n<p>As our customer, your actual Service area, network availability, coverage and quality may vary based on a number of factors, including network capacity, terrain and weather. Outages and interruptions in Service may occur, and speed of Service varies. Devices also have varying speed capabilities and may connect to different networks depending on technology. Even within coverage areas and with broadband-capable devices, network changes, traffic volume, outages, technical limitations, signal strength, obstructions, weather, and other conditions may impact speeds and service availability.</p>\n\n<p>We engineer our network to provide consistent high-speed data service, but at times and at locations where the number of customers using the network exceeds available network resources, customers will experience reduced data speeds. To provide the best possible on-device experience for the most possible customers and minimize capacity issues and degradation in network performance, we may, without advance notice, take any actions necessary to manage our network on a content-agnostic basis, including prioritizing all on-device data over Smartphone Mobile HotSpot (tethering) data and further prioritizing the data usage of a small percentage of data customers who use the highest amount of data (currently, more than 28GB) below that of other customers in times and locations where there are competing customer demands for network resources, for the remainder of the billing cycle.</p>\n\n<p>Where the network is lightly loaded in relation to available capacity, a customer whose data is prioritized below other data traffic will notice little, if any, effect from having lower priority. This will be the case in the vast majority of times and locations. At times and locations where the network is heavily loaded in relation to available capacity, however, these customers will likely see significant reductions in data speeds, especially if they are engaged in data-intensive activities. Customers on Rate Plans and Devices with 4G capability should be aware that these practices may occasionally result in speeds below those typically experienced on our 4G LTE and HSPA networks. We constantly work to improve network performance and capacity, but there are physical and technical limits on how much capacity is available, and in constrained locations the frequency of heavy loading in relation to available capacity may be greater than in other locations. When network loading goes down or the customer moves to a location that is less heavily loaded in relation to available capacity, the customer\x92s speeds will likely improve. See <a style="TEXT-DECORATION: none" href="http://www.T-Mobile.com/OpenInternet" target="_blank">www.T-Mobile.com/OpenInternet</a> for details.</p>\n<strong>\n <br clear="all">\n</strong>\n\n<p style="TEXT-ALIGN: center"><a id="Roaming" name="Roaming"></a><strong>Roaming</strong></p>\n\n<p><strong>*CAN I ROAM ON MY DEVICE?</strong></p>\n\n<p><strong>Domestic</strong> <strong>Roaming:</strong> Your Device may connect to another provider\x92s network (\x93Off-Net\x94). This may happen even when you are within the T-Mobile coverage area. Check your Device to determine if you are Off-Net. Please do not abuse this; we may limit or terminate your Service if you do.</p>\n\n<p><strong>International Roaming &amp; Dialing:</strong> Availability and features offered for international roaming and dialing vary depending on your Rate Plan and Device. All countries may not be available for roaming and available countries may change from time to time; click <a href="http://www.t-mobile.com/optional-services/roaming.html?icid=WMD_TM_INTRNTNLVR_N8J6LRGJILD2658" target="_blank">here</a> for more information about which countries are currently available for roaming. Whether roaming internationally or making and sending international calls and messages while in the U.S. (or Puerto Rico), you may be charged international rates (including for voicemails left for you and for data usage). This includes per minute rates for calls and per minute rates for calls transferred to your voicemail and the relevant data rates for data usage. You may be charged for more than one call for unanswered calls that are forwarded to voicemail regardless of whether the calls result in an actual voicemail message being left for you and regardless of whether your Device is on or off. Different rates and rounding increments apply in different countries. Click <a href="http://www.t-mobile.com/optional-services/roaming.html" target="_blank">here</a> for information on international access, rates, Services and coverage. While roaming internationally, your data throughput may be reduced and your Service may be otherwise limited or terminated at any time without notice. You are responsible for complying with U.S. Export Control laws and regulations, and the import laws and regulations of foreign countries when traveling internationally with your Device.</p>\n\n<br clear="all">\n\n<p style="TEXT-ALIGN: center"><a id="Streaming Video" name="Streaming%20Video"></a><strong>Streaming Video</strong></p>\n\n<p>We deploy streaming video optimization technology in our network as a feature on qualifying Rate Plans, which also helps to ensure that available network capacity can be utilized to provide a good service experience for the maximum number of customers. The optimization technology is intended to manage data usage on the network, reduce the risk of streaming video stalling and buffering on mobile devices, and reduce the amount of data consumed for streaming video, making room for other users to enjoy higher speeds. and a better network experience overall. Video optimization occurs only to data streams that are identified by our packet-core network as video. While many changes to streaming video files are likely to be indiscernible, the optimization process may impact the appearance of the streaming video as displayed on a user\'s Device. Customers may choose Rate Plans where this feature is always enabled (e.g., \u201cT-Mobile ONE\u201d), with the ability to add a feature disabling optimization to foster native-resolution video capability. Alternatively, customers may choose Rate Plans that offer video optimization as a customer-controlled feature (e.g., \u201cBinge On\u201d). When this feature is enabled, on-device video is typically delivered at DVD quality (up to 1.5 Mbps speeds, generally 480p or better).</p>\n\n<p>Some qualifying video providers may choose to opt-out of the Binge On program, see listing at <a href="http://www.t-mobile.com/offer/binge-on-streaming-video.html#" target="_blank">http://www.t-mobile.com/offer/binge-on-streaming-video.html#</a>. The Binge On optimization technology is not applied to the video services of these providers; video from these services will stream at native resolution, and high-speed data consumption will continue as if Binge On were not enabled. Rate Plans that feature this technology allow customers to choose to enable (and disable) video streaming optimization when connected to the cellular network, unless a provider has chosen to opt-out, see listing at <a href="http://www.t-mobile.com/offer/binge-on-streaming-video.html#" target="_blank">http://www.t-mobile.com/offer/binge-on-streaming-video.html#</a>.</p>\n\n<p>For more information about video optimization, <a href="http://www.T-Mobile.com/OpenInternet" target="_blank">click here</a>.</p>\n\n<br clear="all">\n\n<p style="TEXT-ALIGN: center"><a id="EPPUSYD" name="EPPUSYD"></a><strong>Examples of Permitted and Prohibited Uses of the Service and Your Device</strong></p>\n\n<p>Permitted uses include:</p>\n\n<ul>\n <li>Voice calls;</li>\n\n <li>Web browsing;</li>\n\n <li>Messaging;</li>\n\n <li>Email;</li>\n\n <li>Streaming music;</li>\n\n <li>Uploading and downloading applications and content to and from the Internet or third party stores;</li>\n\n <li>Using applications and content without excessively contributing to network congestion; and</li>\n\n <li style="LIST-STYLE-TYPE: none">\n <p>Tethering your Device to other non-harmful devices pursuant to the terms and conditions and allotments of your Data Plan.</p>\n </li>\n</ul>\n\n<p>Unless explicitly permitted by your Rate Plan or Data Plan, you are not permitted to use your Device or the Service in a way that we determine:</p>\n\n<ul>\n <li>Uses a repeater or signal booster other than one we provide to you;</li>\n\n <li>Compromises network security or capacity, degrades network performance, uses malicious software or \x93malware\x94, hinders other customers\x92 access to the network, or otherwise adversely impacts network service levels or legitimate data flows;</li>\n\n <li>Uses applications which automatically consume unreasonable amounts of available network capacity;</li>\n\n <li>Uses applications which are designed for unattended use, automatic data feeds, automated machine-to-machine connections, or applications that are used in a way that degrades network capacity or functionality;</li>\n\n <li>Misuses the Service, including "spamming" or sending abusive, unsolicited, or other mass automated communications;</li>\n\n <li>Accesses the accounts of others without authority;</li>\n\n <li>Results in more than 50% of your voice and/or data usage being off-net (i.e., connected to another provider\x92s network) for any 3 billing cycles within any 12 month period;</li>\n\n <li>Results in unusually high usage (specifically, more data usage than what 97% of all customers use in a month, based on recent historical averages (updated quarterly)) and the majority of your data usage being Smartphone Mobile HotSpot (tethering) usage for any 3 billing cycles within any 6 month period;</li>\n\n <li>Resells the Service, either alone or as part of any other good or service;</li>\n\n <li>Tampers with, reprograms, alters, or otherwise modifies your Device to circumvent any of our policies or violate anyone\x92s intellectual property rights;</li>\n\n <li>Causes harm or adversely affects us, the network, our customers, employees, business, or any other person;</li>\n\n <li>Conflicts with applicable law;</li>\n\n <li>Is not in accordance with these T&amp;Cs; or</li>\n\n <li>Attempts or assists or facilitates anyone else in any of the above activities.</li>\n</ul>\n\n<br clear="all">\n\n<p style="TEXT-ALIGN: center"><a id="Lost or Stolen" name="Lost%20or%20Stolen"></a><strong>Information about What Happens if Your Device is Lost or Stolen</strong></p>\n\n<p>Once you notify us that your Device has been lost or stolen, we will suspend your Service and you will not be responsible for additional usage charges incurred in excess of your Rate Plan Charges, applicable taxes, fees, and surcharges. If Charges are incurred before you notify us, you are not liable for Charges you did not authorize. However, the fact that your Device or acc ount was used is some evidence of authorization. You may request us to investigate Charges you believe were unauthorized. We may ask you to provide information and you may submit information to support your request. If we determine the Charges were unauthorized, we will credit your account. If we determine the Charges were authorized, we will inform you within 30 days and you will remain responsible for the Charges. If you request that we not suspend your Service, you will remain responsible for all Charges incurred. We may prevent a lost or stolen Device from registering on our and other networks.</p>\n\n<p>You can click <a href="http://www.ctia.org/policy-initiatives/voluntary-guidelines/smartphone-anti-theft-voluntary-commitment" target="_blank">here</a> to learn about additional anti-theft measures that may apply to you.</p>\n\n<br clear="all">\n\n<p style="TEXT-ALIGN: center"><a id="Billing Information" name="Billing%20Information"></a><strong>Billing Information</strong></p>\n\n<p>Please read the following for more information about how we bill for calls, data usage and messaging, Wi-Fi usage, third party charges, taxes, and surcharges.</p>\n\n<p><strong>Usage</strong> : Airtime usage is measured from the time the network begins to process a call (before the phone rings or the call is answered) through its termination of the call (after you hang up). For voice calls, we round up any fraction of a minute to the next full minute. Depending upon your Rate Plan, data usage may be rounded at the end of each data session, at the end of your billing cycle, and/or at the time you switch data plans. You may be charged for more than one call/message when you use certain features resulting in multiple inbound or outbound calls/messages (such as call forwarding, call waiting, voicemail, conference calling, and multi-party messaging). You will be charged for text, instant or picture messages, and email whether read or unread, sent or received, solicited or unsolicited. We use filters to block spam messages, but we do not guarantee that you will not receive spam or other unsolicited messages. Additional blocking options are available at <a style="TEXT-DECORATION: none" href="http://www.my.t-mobile.com/" target="_blank">www.my.T-Mobile.com</a>. Most usage and Charges incurred during a billing cycle will be included in your bill for that cycle. Some usage and Charges may be delayed to a later billing cycle, which may cause you to exceed Rate Plan allotments in a later billing cycle. Unused Rate Plan allotments expire at the end of your billing cycle. You may be billed additional Charges for certain features and services. Charges for Wi-Fi usage may differ; see your Rate Plan for more details.</p>\n\n<p><strong>Taxes:</strong> You agree to pay all taxes and fees imposed by governments or governmental entities. We may not give advance notice of changes to these charges. To determine taxes &amp; fees, we use the street address you identified as your Place of Primary Use (\x93PPU\x94). The PPU for <strong>Puerto Rico customers</strong> must be in Puerto Rico. If you did not identify the correct PPU, or if you provided an address, such as a PO Box, that is not a recognized street address, does not allow us to identify the applicable taxing jurisdiction(s) or does not reflect the Service area associated with your telephone number, you may be assigned a default location for tax purposes. Except as may be otherwise required by law, in the event you dispute your PPU or the location we assigned you and the resulting taxes or fees applied on your bill, you must request a refund of the disputed tax or fee within 60 days of the date of our bill containing such tax or fee. Regardless of any Rate Plan guarantee, taxes and fees may change from time to time without notice.</p>\n\n<p>\n <strong>Surcharges</strong> : You agree to pay all surcharges. Surcharges are not mandated or imposed on you by law, they are T-Mobile Charges that are determined, collected and retained by us. The components and amounts of the Surcharges are subject to change without notice. Surcharges include charges, costs, fees and certain taxes that we incur to provide Services (and are not government taxes or fees imposed directly on our customers). Examples include general and administrative fees (such as certain costs we incur to provide Service) as well as governmental-related assessments (such as Federal or State Universal Service fees, regulatory or public safety charges, environmental fees, and gross receipts taxes). Surcharges assessed to you will vary depending on the type of Service and the Rate Plan you have. Surcharges will apply whether or not you benefit from the programs, activities or services included in the Surcharge. When Surcharges are assessed in connection with your Service, you can find the Surcharges detailed in either the \x93Taxes, Fees &amp; Surcharges\x94, \x93T-Mobile Fees and Charges\x94 or the \x93Other Charges\x94 sections of your bill or at your MyT-Mobile.com account. Regardless of any Rate Plan guarantee, Surcharges may change from time to time without notice.\n <br clear="all">\n</p>\n\n<p style="TEXT-ALIGN: center"><a id="License" name="License"></a><strong>Additional Software License Terms</strong></p>\n\n<p>Except as permitted by applicable law, you may not assign, transfer, sublicense, copy, reproduce, redistribute, resell, modify, decompile, attempt to derive the source code of, or reverse engineer all or any part of the Software, or alter, disable or circumvent any digital rights management security features embedded in the Software. The Software may not be transferable from one Device to another Device. You may not create derivative works of all or any part of the Software. You agree the Software contains proprietary content and information owned by T-Mobile, its licensors, and/or other third parties. T-Mobile, its licensors, and such other third parties reserve the right to change, suspend, terminate, remove, impose limits on the use or access to, or disable access to, the Software at any time without notice and will have no liability for doing so. You agree that your violation of the Software license harms T-Mobile, its licensors, and/or other third parties, which cannot be fully redressed by money damages, and that T-Mobile, its licensors, and such other third parties shall be entitled to immediate injunctive relief in addition to all other remedies available.</p>\n\n<br clear="all">\n\n<p style="TEXT-ALIGN: center"><a id="Additional Terms" name="Additional%20Terms"></a><strong>Additional Terms</strong></p>\n\n<p>If we don\'t enforce our rights under this Agreement in one instance, that doesn\'t mean we won\'t or can\'t enforce those rights in any other instance. Except as provided in the Section entitled \x93How Do I Resolve Disputes with T-Mobile\x94, if any part of the Agreement is held invalid that part may be severed from the Agreement.</p>\n\n<p>You can\'t assign or transfer the Agreement or any of your rights or duties under it without our written consent. We may assign or transfer all or part of the Agreement, or your debts to us, without notice. You understand that the assignment or transfer of all or any part of this Agreement or your debt will not change or relieve your obligations under this Agreement.</p>\n\n<p>The Agreement is the entire agreement between you and us regarding the rights you have with respect to your Service, except as provided by law, and you cannot rely on any other documents or statements by any sales or service representatives or other agents.</p>\n\n<p>The original version of the Agreement is in English. To the extent there are conflicts between the English version and any other language version, the English version will control.</p>\n\n<p>If you believe that any material residing on our system or network infringes your copyright, notify our Designated Agent by using the Digital Millennium Copyright Act (DMCA) notice procedure described at <a style="TEXT-DECORATION: none" href="http://www.t-mobile.com/DMCA.htm" target="_blank">www.T-Mobile.com/DMCA.htm</a> (<a style="TEXT-DECORATION: none" href="http://es.t-mobile.com/DMCA.htm" target="_blank">es.T-Mobile.com/DMCA.htm</a> for our Spanish website). Our Designated Agent is Christina Kirkpatrick, 12920 S.E. 38th Street, Bellevue, WA 98006; copyrightagent@t-mobile.com; phone: <span class="tmo_tfn_number">425-383-4000</span>. There are substantial penalties for sending false notices. It is our policy, in appropriate circumstances and in its sole judgment, to suspend or terminate the Service of any subscriber, account holder, or user who is deemed to be a repeat or blatant infringer of copyrights.</p></div>\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t<div class="print"></div>\r\n\t\t\t</div>'} 2017-02-26 16:56:17 [scrapy] DEBUG: Scraped from <200 https://www.t-mobile.com/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditions&amp;print=true> {'content': u'<div id="body" style="text-align:left">\r\n\t\t\t\t<div>\r\n\t\t\t\t\t<div class="print"></div>\r\n\t\t\t\t\t<br>\r\n\t\t\t\t</div>\r\n\t\t\t\t\r\n\t\t\t\t\t<div><p>Did you activate (or renew) service prior to September 1, 2016? If yes, please click the date for the applicable version of the Terms and Conditions: <a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsMar2016&amp;print=true">March 17, 2016 </a> | <a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsFeb2016&amp;print=true">February 17, 2016 </a> | <a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsJan2016&amp;print=true">January 25, 2016 </a>| <a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsNov2015&amp;print=true">November 14, 2015</a> | <a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsJune2015&amp;print=true">June12, 2015</a> | <a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsMar2015&amp;print=true">March 18, 2015</a> |<a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsNov2014&amp;print=true">November 10, 2014</a> |<a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsMar2014&amp;print=true">March 27, 2014</a> |<a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsOct2013&amp;print=true">October 20, 2013</a> |<a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsDec2013&amp;print=true">December 30, 2011</a> |<a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsJuly2011&amp;print=true">July 24, 2011</a> |<a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditionsJuly&amp;print=true">July 18, 2010</a> |<a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditions2008&amp;print=true">June 28, 2008</a> | <a href="/Templates/Popup.aspx?PAsset=Ftr_Ftr_TermsAndConditions2004&amp;print=true">December 2004</a></p>\n\n<p style="TEXT-ALIGN: center"><strong>T-Mobile Terms &amp; Conditions</strong></p>\n\n<p style="TEXT-ALIGN: center">Effective as of September 1, 2016</p>\n\n<p>Thanks for choosing T-Mobile. Please read these Terms &amp; Conditions (\x93T&amp;Cs\x94), which contain important information about your relationship with T-Mobile, including mandatory arbitration of disputes between us, instead of class actions or jury trials. You will become bound by these provisions once you accept these T&amp;Cs.</p>\n\n<p><strong>WHO IS THIS AGREEMENT WITH?</strong></p>\n\n<p>These T&amp;Cs are an agreement between you and us, T-Mobile USA, Inc., and our controlled subsidiaries, assignees, and agents.</p>\n\n<p><strong>HOW DO I ACCEPT THESE T&amp;Cs?</strong></p>\n\n<p>You accept these T&amp;Cs by doing any of the following things:</p>\n\n<ul>\n <li>giving us a written or electronic signature or confirmation, or telling us orally that you accept;</li>\n\n <li>activating, using or paying for the Service or a Device; or</li>\n\n <li>opening the Device box.</li>\n</ul>\n\n<p>If you don\x92t want to accept these T&amp;Cs, don\x92t do any of these things.</p>\n\n<p>When you accept, you\'re telling us that you are of legal age (which means you are either legally emancipated, or have reached the age of majority as defined in your jurisdiction) and that you are able to enter into a contract. If you accept for an organization, you\'re telling us that you are authorized to bind that organization, and references to "you" in these T&amp;Cs may mean the organization.</p>\n\n<p><strong>WHAT IS INCLUDED IN THESE TERMS AND CONDITIONS?</strong></p>\n\n<p>In these T&amp;Cs, you\'ll find important information about:</p>\n\n<ul>\n <li>T-Mobile services provided to you (\x93Services\x94);</li>\n\n <li>Any equipment for which we provide Service, such as a phone, handset, tablet, or SIM card (collectively, a \x93Device\x94);</li>\n\n <li>Any charges, taxes, fees, and other amounts we bill you or that were accepted or processed through your Device (\x93Charges\x94);</li>\n\n <li>Privacy information;</li>\n\n <li>Network management practices;</li>\n\n <li>Limitations of liability; and</li>\n\n <li>Resolution of disputes by arbitration and class action waiver (full terms available <a href="#Dispute%20Resolution">here</a>).</li>\n</ul>\n\n<p><strong>ARE THERE ANY OTHER TERMS THAT APPLY TO ME?</strong></p>\n\n<p>Yes. Your \x93Agreement\x94 includes these T&amp;Cs, the additional terms found in your Rate Plan, your Data Plan, your Service Agreement, and provisions linked to from these T&amp;Cs. Sections marked \x93*\x94 continue after termination of our Agreement with you.</p>\n\n<p>You should also be aware that our <a style="TEXT-DECORATION: none" href="http://www.t-mobile.com/company/website/privacypolicy.aspx" target="_blank">Privacy Policy</a> and <a style="TEXT-DECORATION: none" href="http://www.T-Mobile.com/OpenInternet" target="_blank">Open Internet Policy</a> apply to the use of our products and services.</p>\n\n<p>You might also have other agreements with us, such as an equipment installment plan or JUMP! On Demand Lease Agreement.</p>\n\n<p><strong>*HOW DO I RESOLVE DISPUTES WITH T-MOBILE?</strong></p>\n\n<p>By accepting these T&amp;Cs, you are agreeing to resolve any dispute with us through binding arbitration (unless you opt out) or small claims dispute procedures, and to waive your rights to a class action suit and jury trial. Your complete arbitration agreement, including opt-out instructions, is available <a href="#Dispute%20Resolution">here</a>, and the opt-out website is available <a href="https://www.t-mobiledisputeresolution.com/" target="_blank">here</a>. For additional terms and conditions governing a dispute between us, including how to dispute Charges assessed to you on your bill, choice of law, disclaimers of certain warranties, limitations of liabilities, and your indemnification obligations, <a href="#OTRDR">click here</a>.</p>\n\n<p><strong>WHAT IS A RATE PLAN?</strong></p>\n\n<p>Your \x93Rate Plan\x94 includes your Service allotments, for example, for minutes, messages or data, rates, coverage and other terms. You can check your current usage by visiting my.T-mobile.com, using the T-Mobile My Account app, or by using a short code from your Device (you can find more information about the short code at www.t-mobile.com). If any term in your Rate Plan conflicts with these T&amp;Cs, the term in your Rate Plan governs.</p>\n\n<p><strong>HOW WILL I BE CHARGED FOR DATA USAGE?</strong></p>\n\n<p>Data service may be included in your Rate Plan or data pass or you may be charged for data usage on a pay per use basis (\x93Data Plan\x94). Your Rate Plan and/or Data Plan will contain more information about how we calculate data usage. You can check your current usage by visiting my.T-mobile.com, using the T-Mobile My Account app, or by using a short code from your device (you can find more information about the short code at www.t-mobile.com). If you do not have a Data Plan, your Device may not be able to access data services.</p>\n\n<p><strong>ARE THERE SEPARATE TERMS FOR PREPAID CUSTOMERS?</strong></p>\n\n<p>The terms of these T&amp;Cs apply to prepaid customers, and additional terms specific to prepaid customers may be <a href="#Additional%20Terms%20for%20Prepaid%20Customers">found here</a>.</p>\n\n<p><strong>HOW DO I GIVE OTHER PEOPLE ACCESS TO MY ACCOUNT?</strong></p>\n\n<p>If you want someone else to be able to access and manage your account, you can establish them as an \x93Authorized User,\x94 so they can:</p>\n\n<ul type="disc">\n <li>Make changes to your account;</li>\n\n <li>Add or remove services or features to your account;</li>\n\n <li>Receive notices and disclosures on your behalf;</li>\n\n <li>Purchase Devices for use with our Service, including under an installment plan; and</li>\n\n <li>Incur Charges on your account.</li>\n</ul>\n\n<p>The easiest way to designate an Authorized User is through your my.T-mobile.com account. Keep in mind that you should not share your account validation information, which includes the last four digits of your social security number or your passcode. This information is sensitive so take steps to protect it. We will treat presentation of the proper account validation information as authorized access to an account.</p>\n\n<p><strong>WHERE, HOW, AND WHEN DOES MY SERVICE WORK?</strong></p>\n\n<p>These T&amp;Cs describe the experience you can expect on our network, including information about our reasonable network management practices, and the experience on our roaming partners\x92 networks:</p>\n\n<ul>\n <li>Please check our coverage maps, which approximate our anticipated coverage area outdoors. Your experience on our network may vary and change without notice depending on a variety of factors. For more information, <a href="#UsingOurNetwork">click here</a>. You agree that we are not liable for problems relating to Service availability or quality.</li>\n\n <li>For more information about roaming, <a href="#Roaming">click here</a>.</li>\n\n <li>To provide the best possible experience for the most possible customers, we prioritize the data usage of a small percentage of our data customers who use the highest amount of data (as of 10/28/16, more than 28GB) below that of other customers in times and locations where there are competing customer demands for network resources. We also prioritize smartphone and mobile internet (tablet) over Smartphone Mobile HotSpot (tethering) traffic on our network. <a href="#UsingOurNetwork">Click here</a> for more information.</li>\n\n <li>We utilize streaming video optimization technology in our network on qualifying Rate Plans, which helps to minimize data consumption, while also improving the service experience for all customers. Some Rate Plans have video optimization via the Binge On feature. Some qualifying video providers may choose to opt-out of the Binge On program, see listing at <a href="http://www.t-mobile.com/offer/binge-on-streaming-video.html#" target="_blank">http://www.t-mobile.com/offer/binge-on-streaming-video.html#</a>. The Binge On optimization technology is not applied to the video services of these providers; video from these services will stream at native resolution, and high-speed data consumption will continue as if Binge On were not enabled.</li>\n\n <li>Additionally, we may implement other network practices, such as caching less data.</li>\n\n <li>Our <a style="TEXT-DECORATION: none" href="http://www.T-Mobile.com/OpenInternet" target="_blank">Open Internet Policy</a> includes important information on these topics as well as information on commercial terms, performance characteristics (such as expected speed, latency) and network practices.</li>\n</ul>\n\n<p><strong>*WHAT ARE THE PERMITTED AND PROHIBITED USES FOR MY DEVICE AND THE SERVICE?</strong></p>\n\n<p>Our wireless network is a shared resource, which we manage for the benefit of all of our customers. Your Data Plan is intended for Web browsing, messaging, and similar activities. Certain activities and uses of our Services and your Device are permitted and others are not. For examples of permitted and prohibited uses, <a href="#EPPUSYD">click here</a>. If you buy, lease, or finance a Device manufactured for use on our network, you agree, and we rely on your agreement, that you intend it to be activated on our Service and will not resell or modify the Device, or assist anyone doing so.</p>\n\n<p><strong>*WHAT HAPPENS IF MY DEVICE IS LOST OR STOLEN?</strong></p>\n\n<p>You agree to notify us if your Device is lost or stolen. Once you notify us, we will suspend your Service. <a href="#Lost%20or%20Stolen">Click here</a> to learn more about how we handle Charges that are incurred after you report that your Device is lost or stolen.</p>\n\n<p><a id="internationalServices" name="internationalServices"></a><a id="internationalLongDistance" name="internationalLongDistance"></a><a id="internationalLongDistanceTextPictureVide" name="internationalLongDistanceTextPictureVide"></a><a id="internationalRoaming" name="internationalRoaming"></a><a id="internationalData" name="internationalData"></a><a id="dataGlobalAddOnsAndGlobalMessagingPlans" name="dataGlobalAddOnsAndGlobalMessagingPlans"></a><a id="cruiseShipRoaming" name="cruiseShipRoaming"></a><a id="internationalMiscellaneous" name="internationalMiscellaneous"></a><strong>*HOW WILL I BE BILLED FOR USE OF THE SERVICES?</strong></p>\n\n<p>You agree to pay all Charges we assess and bill you or that were accepted or processed through all Devices on your account. You may have to pay extra for calls to some numbers (e.g. conference &amp; chat lines, broadcast, international, 900 or 976 calls, etc.). You agree to provide us with accurate and complete billing and tax related information and to report all changes within 30 days of the change. You will receive an electronic (paperless) bill unless you tell us you want a paper bill. You have the option of switching to a paper bill at no cost to you by changing your billing preferences at My T-Mobile, using the T-Mobile My Account app, or by contacting Customer Care. For more information about paperless billing, please visit <a style="TEXT-DECORATION: none" href="http://www.t-mobile.com/billterms" target="_blank">www.t-mobile.com/billterms</a>.</p>\n\n<p>Your Device can be used to purchase services and products from third parties, and Charges for these purchases may be included on your T-Mobile bill. For no additional cost you can block third party charges from being included on your T-Mobile bill by logging into your account at www.my.T-Mobile.com or calling Customer Care. For more information about billing, <a href="#Billing%20Information">click here</a>.</p>\n\n<p><a id="textInstantMsgPicVidMsg" name="textInstantMsgPicVidMsg"></a><strong>WHAT IF I DON\x92T PAY ON TIME?</strong></p>\n\n<p>We may charge a late fee of the greater of 1.5% per month (18% annually) or $5 per month and a returned payment fee up to $35, subject to the maximum allowed by law. We may use a collection agency to collect past due balances and you agree to pay collection agency fees. If we accept late or partial payments, you still must pay us the full amount you owe, including late fees. We will not honor limiting notations you make on or with your checks. Late payment, non-payment or collection agency fees are liquidated damages intended to be a reasonable advance estimate of our costs resulting from late payments and non-payments by our customers; these costs are not readily ascertainable and are difficult to predict or calculate at the time that these fees are set.</p>\n\n<p><strong>*DOES T-MOBILE CHECK MY CREDIT?</strong></p>\n\n<p>Yes, for many of our products and services. We may get information about your credit history from credit-reporting agencies, which may affect your credit rating. We may also report your payment record to credit-reporting agencies.</p>\n\n<p><strong>AM I REQUIRED TO MAKE A DEPOSIT?</strong></p>\n\n<p>We may require you to make a deposit or prepayment for Services. We can apply deposits, payments, or prepayments in any order to any amounts you owe us on any account. This deposit is refundable, and will be applied as a credit to your account along with interest as may be required by law.</p>\n\n<p><strong>CAN T-MOBILE ACCESS MY DEVICE?</strong></p>\n\n<p>We may remotely change software, systems, applications, features or programming on your Device without notice. These changes will modify your Device and may affect or erase data you have stored on your Device, the way you have programmed your Device, or the way you use your Device. You will not be able to use your Device during the installation of the changes, even for emergencies.</p>\n\n<p><strong>CAN I DOWNLOAD AND USE THIRD PARTY CONTENT AND APPS ON MY DEVICE?</strong></p>\n\n<p>Yes. You are free to download and use content or applications (\x93Content &amp; Apps\x94) on your Device that are not provided by T-Mobile, at your own risk. Third party Content &amp; Apps may require your agreement to a license or other terms with the third party. Some Devices or Content &amp; Apps may contact our network without your knowledge, which may result in additional Charges (e.g., while roaming internationally).</p>\n\n<p><strong>*LICENSE</strong></p>\n\n<p>Your Device\x92s Software is licensed, not sold, to you by T-Mobile and/or other licenso rs for your personal, lawful, non-commercial use on your Device only. You may only use the Software as authorized by its license. Your Device\x92s \x93Software\x94 includes its software, interfaces, documentation, data, and Content &amp; Apps, as each may be updated or replaced by feature enhancements or other updates. For additional information regarding these license terms, including restrictions on your use of the Software, please <a href="#License">click here</a>.</p>\n\n<p><strong>*WHAT IS THE TERM OF THESE T&amp;Cs?</strong></p>\n\n<p>As the Un-Carrier, we did away with annual service contracts. You are free to go, although we\x92d be sad to see you leave. You are responsible for all Charges incurred through the end of your Service term. In addition, cancellation of Service may affect other agreements that you have with us, including equipment installment plans or lease agreements where some of your payments may be accelerated upon cancellation.</p>\n\n<p><strong>CAN T-MOBILE CHANGE OR TERMINATE MY SERVICES OR THIS AGREEMENT?</strong></p>\n\n<p>Yes. Except as described below for Rate Plans with the price-lock guarantee, we may change, limit, suspend or terminate your Service or this Agreement at any time, including if you engage in any of the prohibited uses described <a href="#EPPUSYD">here</a> or no longer reside in a T-Mobile-owned network coverage area. Under certain limited circumstances, we may also block your device from working on our network. If the change to your Service or Rate Plan will have a material adverse effect on you, we will provide 14 days\x92 notice of the change. You\x92ll agree to any change by using your Service after the effectiveness of the change. We may exclude certain types of calls, messages or sessions (e.g. conference and chat lines, broadcast, international, 900 or 976 calls, etc.), in our sole discretion, without further notice.</p>\n\n<p>If you are on a price-lock guaranteed Rate Plan, we will not increase your monthly recurring Service charge (\x93Recurring Charge\x94) for the period that applies to your Rate Plan, or, if no specific period applies, for as long as you continuously remain a customer in good standing on a qualifying Rate Plan. If you switch plans, the price-lock guarantee for your new Rate Plan will apply (if there is one). The price-lock guarantee does not include taxes, surcharges, fees, or charges for extra features or Devices. If your Service or account is limited, suspended or terminated and then reinstated, you may be charged a reactivation fee. For information about our unlocking policy, <a style="TEXT-DECORATION: none" href="http://www.t-mobile.com/Company/CompanyInfo.aspx?tp=Abt_Tab_CompanySimUnlockPolicy&amp;link=unav" target="_blank">click here</a>.</p>\n\n<p><strong>*YOUR CONSENT TO BE CONTACTED</strong></p>\n\n<p>We may contact you without charge, on any wireless telephone number assigned to your account for any purpose, including marketing messages, and in any manner permitted by law. You also expressly consent to be contacted by us, and anyone contacting you on our behalf, for any purpose, including billing, collection, or other account or service related purpose, at any telephone number or physical or electronic address where you may be reached, including any wireless telephone number. You agree that T-Mobile, and anyone contacting you on our behalf, may communicate with you in any manner, including using a pre-recorded or artificial voice, or using an automatic telephone dialing system to place calls or send messages, alerts, or an automatic e-mail system to deliver email messages. If a contact number you have provided to us is no longer your number, you agree to notify us promptly that you can no longer be reached at that number. You represent that you have received, and are authorized to convey to us, the consent of any authorized users on your account to be contacted by us as described in this Section. You agree that all consents provided in this Section will survive cancellation of your Service and account.</p>\n\n<p><strong>HOW DO WE NOTIFY EACH OTHER?</strong></p>\n\n<p>You may contact us at www.T-Mobile.com, by calling <span class="tmo_tfn_number">1-877-453-1304</span> or 611 from your Device, or by writing to: T-Mobile Customer Relations, P.O. Box 37380, Albuquerque, NM 87176-7380. <strong>Puerto Rico customers</strong> contact us at: T-Mobile Customer Relations, 654 Mu\xf1\xf2z Rivera Avenue, Suite 2000, Hato Rey, Puerto Rico 00918, Attn: Customer Care Manager. Electronic notices are considered delivered when sent. Mail notices are considered delivered 3 days after mailing. For multi-line accounts, we may assign a \x93Primary Telephone Number\x94 to your account for the purpose of receiving notices, as well as for other purposes. If you would like to change it, contact us.</p>\n\n<p>To begin arbitration or other legal proceeding, you must serve our registered agent. Our registered agent is Corporation Service Company and can be contacted at <span class="tmo_tfn_number">1-866-403-5272</span>. For <strong>Puerto Rico customers</strong>, our registered agent is The Prentice-Hall Corporation System, Puerto Rico, Inc. and can be contacted at FGR Corporate Services, Inc., Oriental Bank Building, Suite P-1, 254, Mu\xf1oz Rivera Avenue, San Juan, Puerto Rico, 00918, phone: 1-800-927-9801.</p>\n\n<p><strong>EMERGENCY ALERTS</strong></p>\n\n<p>We have chosen to offer wireless emergency alerts, within portions of its coverage area, on wireless alert capable Devices. There is no additional charge for these wireless emergency alerts. For details visit <a href="http://www.t-mobile.com/Company/CompanyInfo.aspx?tp=Abt_Tab_CompanySafety&amp;tsp=Abt_Sub_WirelessEmergencyAlerts">http://www.t-mobile.com/Company/CompanyInfo.aspx?tp=Abt_Tab_CompanySafety&amp;tsp=Abt_Sub_WirelessEmergencyAlerts</a> .</p>\n\n<p><strong>*WHAT ELSE DO I NEED TO KNOW?</strong></p>\n\n<p><a href="#Additional%20Terms">Click here</a> for additional terms that apply to you.</p>\n\n<br clear="all">\n\n<p style="TEXT-ALIGN: center"><a id="Dispute Resolution" name="Dispute%20Resolution"></a><strong>Dispute Resolution</strong></p>\n\n<p><strong>*HOW DO I RESOLVE DISPUTES WITH T-MOBILE?</strong></p>\n\n<p><strong>Dispute Resolution and Arbitration. YOU AND WE EACH AGREE THAT, EXCEPT AS PROVIDED BELOW (AND EXCEPT AS TO PUERTO RICO CUSTOMERS), ANY AND ALL CLAIMS OR DISPUTES IN ANY WAY RELATED TO OR CONCERNING THE AGREEMENT, OUR PRIVACY POLICY, OUR SERVICES, DEVICES OR PRODUCTS, INCLUDING ANY BILLING DISPUTES, WILL BE RESOLVED BY BINDING ARBITRATION OR IN SMALL CLAIMS COURT</strong> . This includes any claims against other parties relating to Services or Devices provided or billed to you (such as our suppliers, dealers, authorized retailers, or third party vendors) whenever you also assert claims against us in the same proceeding. You and we each also agree that the Agreement affects interstate commerce so that the Federal Arbitration Act and federal arbitration law, not state law, apply and govern the enforceability of this dispute resolution provision (despite the general choice of law provision set forth below). THERE IS NO JUDGE OR JURY IN ARBITRATION, AND COURT REVIEW OF AN ARBITRATION AWARD IS LIMITED. THE ARBITRATOR MUST FOLLOW THIS AGREEMENT AND CAN AWARD THE SAME DAMAGES AND RELIEF AS A COURT (INCLUDING ATTORNEYS\x92 FEES).</p>\n\n<p>Notwithstanding the above, <strong>YOU MAY CHOOSE TO PURSUE YOUR CLAIM IN COURT AND NOT BY ARBITRATION IF YOU OPT OUT OF THESE ARBITRATION PROCEDURES <u>WITHIN 30 DAYS</u> FROM THE EARLIER OF THE DATE YOU PURCHASED A DEVICE FROM US OR THE DATE YOU ACTIVATED A NEW LINE OF SERVICE (the \x93Opt Out Deadline\x94)</strong> . You must opt out by the Opt Out Deadline for each line of Service. You may opt out of these arbitration procedures by calling <span class="tmo_tfn_number">1-866-323-4405</span> or online at <a style="TEXT-DECORATION: none" href="http://www.T-Mobiledisputeresolution.com" target="_blank">www.T-Mobiledisputeresolution.com</a> <strong>Any opt-out received after the Opt Out Deadline will not be valid and you must pursue your claim in arbitration or small claims court.</strong></p>\n\n<p>For all disputes (except for Puerto Rico customers), whether pursued in court or arbitration, you must first give us an opportunity to resolve your claim by sending a written description of your claim to the address provided in the \x93How Do We Send Notices to Each Other\x94 Section below. You and we each agree to negotiate your claim in good faith. If you and we are unable to resolve the claim within 60 days after we receive your claim description, you may pursue your claim in arbitration. You and we each agree that if you fail to timely pay amounts due, we may assign your account for collection, and the collection agency may pursue, in small claims court, claims limited strictly to the collection of the past due amounts and any interest or cost of collection permitted by law or this Agreement.</p>\n\n<p><strong>If the arbitration provision applies or you choose arbitration to resolve your disputes, then either you or we may start arbitration proceedings</strong> . You must send a letter requesting arbitration and describing your claim to our registered agent (see the \x93How Do We Send Notices to Each Other\x94 section below) to begin arbitration. The arbitration of all disputes will be administered by the American Arbitration Association ("AAA") under its Consumer Arbitration Rules in effect at the time the arbitration is commenced. The AAA rules are available at www.adr.org or by calling <span class="tmo_tfn_number">1-800-778-7879</span>. The arbitration of all disputes will be conducted by a single arbitrator, who shall be selected using the following procedure: (a) the AAA will send the parties a list of five candidates; (b) if the parties cannot agree on an arbitrator from that list, each party shall return its list to the AAA within 10 days, striking up to two candidates, and ranking the remaining candidates in order of preference; (c) AAA shall appoint as arbitrator the candidate with the highest aggregate ranking; and (d) if for any reason the appointment cannot be made according to this procedure, the AAA may exercise its discretion in appointing the arbitrator. Upon filing of the arbitration demand, we will pay or reimburse all filing, administration and arbitrator fees. An arbitrator may award on an individual basis any relief that would be available in a court, including injunctive or declaratory relief and attorneys\x92 fees. In addition, for claims under $75,000 as to which you provided notice and negotiated in good faith as required above before initiating arbitration, if the arbitrator finds that you are the prevailing party in the arbitration, you will be entitled to a recovery of reasonable attorneys\x92 fees and costs. Except for claims determined to be frivolous, we agree not to seek an award of attorneys\x92 fees in arbitration even if an award is otherwise available under applicable law. <strong>Puerto Rico customers</strong>: See below for details on the Puerto Rico Telecommunications Dispute Procedure.</p>\n\n<p><strong><u>CLASS ACTION WAIVER</u></strong> . <strong>YOU AND</strong> <strong>WE EACH AGREE THAT ANY PROCEEDINGS, WHETHER IN ARBITRATION OR COURT, WILL BE CONDUCTED ONLY ON AN INDIVIDUAL BASIS AND NOT IN A CLASS OR REPRESENTATIVE ACTION OR AS A MEMBER IN A CLASS, CONSOLIDATED OR REPRESENTATIVE ACTION</strong> . If a court or arbitrator determines in an action between you and us that this Class Action Waiver is unenforceable, the arbitration agreement will be void as to you. <strong>If you choose to pursue your claim in court by opting out of the arbitration provision as specified above, this Class Action Waiver provision will not apply to you. Neither you, nor any other customer, can be a class representative, class member, or otherwise participate in a class, consolidated, or representative proceeding without having complied with the opt out requirements above.</strong></p>\n\n<p><strong><u>JURY TRIAL WAIVER</u></strong> . If a claim proceeds in court rather than through arbitration, <strong>YOU AND</strong> <strong>WE EACH WAIVE ANY RIGHT TO A JURY TRIAL</strong>.</p>\n\n<p><strong><u>PUERTO RICO CUSTOMERS</u></strong> <strong>:</strong> We will provide you with a determination regarding any dispute you present to us within 15 days after we receive it. You will have 20 days from the mailing date of the notification to request a reconsideration of our determination. You may appeal our determination to the Telecommunications Board of the Commonwealth of Puerto Rico (\x93Telecommunications Board\x94) by filing a petition for review up to 30 days after the date of our determination. Your petition for review shall be made through the filing of a document containing the following information: (a) your name and address; (b) our company name; (c) the pertinent facts; (d) any applicable legal provisions that you are aware of; and (e) the remedy you are requesting. The document may be filed handwritten or typewritten, and must be signed by you. You must send us a copy of your document to the following address: 654 Mu\xf1oz Rivera Avenue, Suite 2000, Hato Rey, Puerto Rico 00918, Attn: Customer Care Manager. You must send your petition for review to the Puerto Rico Telecommunications Regulatory Board at the following address: 500 Ave. Roberto H. Todd (Pda. 18 \x96 Santurce), San Juan, Puerto Rico 00907-3941. The Telecommunications Board will review our determination only on appeal. You are advised of the provisions regarding suspension of Service that appear in Law 33 of July 7, 1985, Law 213 of September 12, 1996 and Regulations 8065 promulgated on August 31, 2011 by the Telecommunications Board regarding the procedures for customer\x92s dispute resolution and suspension of Services.</p>\n<strong>\n <br clear="all">\n</strong>\n\n<p style="TEXT-ALIGN: center"><a id="OTRDR" name="OTRDR"></a><strong>Other Terms Regarding Dispute Resolution</strong></p>\n\n<p><strong>*HOW CAN I DISPUTE MY CHARGES?</strong></p>\n\n<p>If you have any questions about your bill or want to dispute any Charges, please contact us by visiting www.T-Mobile.com, by calling <span class="tmo_tfn_number">800-937-8997</span> or 611 from your Device, or by writing to T-Mobile Customer Relations, P.O. Box 37380, Albuquerque, NM 87176-7380. If this does not fix things, please notify us in writing. Unless otherwise provided by law, you must notify us in writing of any dispute regarding your bill or Charges to your account within 60 days after the date you first receive the disputed bill or Charge. If you don\x92t, you may not pursue a claim in arbitration or in court. If you accept a credit, refund or other compensation or benefit to resolve a disputed bill or Charge, you agree that the issue is fully and finally resolved. Unless otherwise provided by law, you must pay disputed Charges until the dispute is resolved.</p>\n\n<p><strong>*CHOICE OF LAW</strong></p>\n\n<p>This Agreement is governed by the Federal Arbitration Act, applicable federal law, and the laws of the state in which your billing address in our records is located, without regard to the conflicts of laws rules of that state. Foreign laws (except for Puerto Rico) do not apply. Arbitration or court proceedings must be in: (a) the county and state in which your billing address in our records is located, but not outside the U.S.; or (b) in Puerto Rico if your billing address is in Puerto Rico. If any provision of the Agreement is invalid under the law of a particular jurisdiction, that provision will not apply in that jurisdiction.</p>\n\n<p><strong>*DISCLAIMER OF WARRANTIES</strong></p>\n\n<p><strong>Except for any written warranty that may be provided with a T-Mobile Device you purchase from us, and to the extent permitted by law, the Services and Devices are provided on an \x93as is\x94 and \x93with all faults\x94 basis and without warranties of any kind. We make no representations or warranties, express or implied, including any implied warranty of merchantability or fitness for a particular purpose concerning your Service or your Device. We can\x92t and don\x92t promise uninterrupted or error-free service and don\x92t authorize anyone to make any warr anties on our behalf. This doesn\x92t deprive you of any warranty rights you may have against anyone else. We do not guarantee that your communications will be private or secure; it is illegal for unauthorized people to intercept your communications, but such interceptions can occur.</strong></p>\n\n<p><strong>Services or Software provided by third parties (including voice applications), 911 or E911, text to 911, or other calling or messaging functionality, may work differently than services offered by us, or may not work at all. Please review all terms and conditions of such third party products.</strong> <strong>We are not responsible for failures to connect or complete 911 calls or text to 911 messages or if inaccurate location information is provided. 911 service may not be available or reliable and your ability to receive emergency services may be impeded</strong> . <strong>We cannot assure you that if you place a 911 call or text you will be found.</strong></p>\n\n<p><strong>We are not responsible for any download, installation, use, transmission failure, interruption, or delay related to Content &amp; Apps, or any third party content, services, advertisements, or websites you may be able to access by using your Device or the Services, even if charges for Content &amp; Apps appear on your T-Mobile bill.</strong> <strong>You are responsible for maintaining virus and other Internet security protections when accessing third party Content &amp; Apps or other services.</strong></p>\n\n<p><strong>*LIMITATION OF LIABILITY</strong></p>\n\n<p><strong>Unless prohibited by law, you and we each agree to limit claims for damages or other monetary relief against each other to direct and actual damages regardless of the theory of liability. This means that neither of us will seek any indirect, special, consequential, treble, or punitive damages from the other. This limitation and waiver also applies to any claims you may bring against any other party to the extent that we would be required to indemnify that party for such claim. You agree we are not liable for problems caused by you or a third party, or by any act of God.</strong> <strong>You also agree we aren\'t liable for missed or deleted voice mails or other messages, for any information (like pictures) that gets lost or deleted if we work on your Device, or for failure or delay in connecting a call or text to 911 or any other emergency service. Except to the extent prohibited by law, all claims must be brought within 2 years of the date the claim arises.</strong></p>\n\n<p><strong>*INDEMNIFICATION</strong></p>\n\n<p>You agree to defend, indemnify, and hold us and our directors, officers, and employees harmless from any claims arising out of use of the Service or Devices, breach of the Agreement, or violation of any laws or regulations or the rights of any third party by you, any person on your account or that you allow to use the Service or your Device.</p>\n\n<br clear="all">\n\n<p style="TEXT-ALIGN: center"><a id="Additional Terms for Prepaid Customers" name="Additional%20Terms%20for%20Prepaid%20Customers"></a><strong>Additional Terms for Prepaid Customers</strong></p>\n\n<p>Your T-Mobile prepaid Service account balance, if sufficient, or your active prepaid plan, gives you access to our prepaid Service for a limited amount of time; you must use your prepaid Service during the designated period of availability. To use our prepaid Service you must have a T-Mobile prepaid Service account balance for pay as you go service or be on an active prepaid plan. Service will be suspended when your account balance reaches zero and/or you are at the end of the time period associated with your prepaid plan. Monthly plan features are available for 30 days, however, depending on the time of day that you activate your Service or that your Service expires, your service cycle may not equal 30 full 24 hour days. Your monthly plan will automatically renew at the end of 30 days if you have a sufficient T-Mobile prepaid Service account balance to cover your prepaid Service plan before the first day after your service cycle. If you do not have a sufficient T-Mobile prepaid Service account balance, your prepaid Service will be suspended unless you move to a pay as you go plan. If you do not reinstate prepaid Service within the required period based upon your service plan, your phone number will be reallocated. The Charges for Service and the amount of time that Service is available following activation of your prepaid Service account balance may vary; see your Rate Plan for more information. Prepaid Service is non-refundable (even if returned during the Cancellation Period), and no refunds or other compensation will be given for unused airtime balances, lost or stolen prepaid cards, or coupons. You will not have access to detailed usage records or receive monthly bills. Coverage specific to our prepaid Service may be found at <a style="TEXT-DECORATION: none" href="http://prepaid-phones.t-mobile.com/prepaid-coverage" target="_blank">http://prepaid-phones.t-mobile.com/prepaid-coverage</a> and differs from coverage related to our postpaid Service.</p>\n\n<br clear="all">\n\n<p style="TEXT-ALIGN: center"><a id="UsingOurNetwork" name="UsingOurNetwork"></a><strong>Using Our Network</strong></p>\n\n<p><strong>WILL MY SERVICE VARY? WHAT FACTORS MAY AFFECT MY SERVICE?</strong></p>\n\n<p>As our customer, your actual Service area, network availability, coverage and quality may vary based on a number of factors, including network capacity, terrain and weather. Outages and interruptions in Service may occur, and speed of Service varies. Devices also have varying speed capabilities and may connect to different networks depending on technology. Even within coverage areas and with broadband-capable devices, network changes, traffic volume, outages, technical limitations, signal strength, obstructions, weather, and other conditions may impact speeds and service availability.</p>\n\n<p>We engineer our network to provide consistent high-speed data service, but at times and at locations where the number of customers using the network exceeds available network resources, customers will experience reduced data speeds. To provide the best possible on-device experience for the most possible customers and minimize capacity issues and degradation in network performance, we may, without advance notice, take any actions necessary to manage our network on a content-agnostic basis, including prioritizing all on-device data over Smartphone Mobile HotSpot (tethering) data and further prioritizing the data usage of a small percentage of data customers who use the highest amount of data (currently, more than 28GB) below that of other customers in times and locations where there are competing customer demands for network resources, for the remainder of the billing cycle.</p>\n\n<p>Where the network is lightly loaded in relation to available capacity, a customer whose data is prioritized below other data traffic will notice little, if any, effect from having lower priority. This will be the case in the vast majority of times and locations. At times and locations where the network is heavily loaded in relation to available capacity, however, these customers will likely see significant reductions in data speeds, especially if they are engaged in data-intensive activities. Customers on Rate Plans and Devices with 4G capability should be aware that these practices may occasionally result in speeds below those typically experienced on our 4G LTE and HSPA networks. We constantly work to improve network performance and capacity, but there are physical and technical limits on how much capacity is available, and in constrained locations the frequency of heavy loading in relation to available capacity may be greater than in other locations. When network loading goes down or the customer moves to a location that is less heavily loaded in relation to available capacity, the customer\x92s speeds will likely improve. See <a style="TEXT-DECORATION: none" href="http://www.T-Mobile.com/OpenInternet" target="_blank">www.T-Mobile.com/OpenInternet</a> for details.</p>\n<strong>\n <br clear="all">\n</strong>\n\n<p style="TEXT-ALIGN: center"><a id="Roaming" name="Roaming"></a><strong>Roaming</strong></p>\n\n<p><strong>*CAN I ROAM ON MY DEVICE?</strong></p>\n\n<p><strong>Domestic</strong> <strong>Roaming:</strong> Your Device may connect to another provider\x92s network (\x93Off-Net\x94). This may happen even when you are within the T-Mobile coverage area. Check your Device to determine if you are Off-Net. Please do not abuse this; we may limit or terminate your Service if you do.</p>\n\n<p><strong>International Roaming &amp; Dialing:</strong> Availability and features offered for international roaming and dialing vary depending on your Rate Plan and Device. All countries may not be available for roaming and available countries may change from time to time; click <a href="http://www.t-mobile.com/optional-services/roaming.html?icid=WMD_TM_INTRNTNLVR_N8J6LRGJILD2658" target="_blank">here</a> for more information about which countries are currently available for roaming. Whether roaming internationally or making and sending international calls and messages while in the U.S. (or Puerto Rico), you may be charged international rates (including for voicemails left for you and for data usage). This includes per minute rates for calls and per minute rates for calls transferred to your voicemail and the relevant data rates for data usage. You may be charged for more than one call for unanswered calls that are forwarded to voicemail regardless of whether the calls result in an actual voicemail message being left for you and regardless of whether your Device is on or off. Different rates and rounding increments apply in different countries. Click <a href="http://www.t-mobile.com/optional-services/roaming.html" target="_blank">here</a> for information on international access, rates, Services and coverage. While roaming internationally, your data throughput may be reduced and your Service may be otherwise limited or terminated at any time without notice. You are responsible for complying with U.S. Export Control laws and regulations, and the import laws and regulations of foreign countries when traveling internationally with your Device.</p>\n\n<br clear="all">\n\n<p style="TEXT-ALIGN: center"><a id="Streaming Video" name="Streaming%20Video"></a><strong>Streaming Video</strong></p>\n\n<p>We deploy streaming video optimization technology in our network as a feature on qualifying Rate Plans, which also helps to ensure that available network capacity can be utilized to provide a good service experience for the maximum number of customers. The optimization technology is intended to manage data usage on the network, reduce the risk of streaming video stalling and buffering on mobile devices, and reduce the amount of data consumed for streaming video, making room for other users to enjoy higher speeds. and a better network experience overall. Video optimization occurs only to data streams that are identified by our packet-core network as video. While many changes to streaming video files are likely to be indiscernible, the optimization process may impact the appearance of the streaming video as displayed on a user\'s Device. Customers may choose Rate Plans where this feature is always enabled (e.g., \u201cT-Mobile ONE\u201d), with the ability to add a feature disabling optimization to foster native-resolution video capability. Alternatively, customers may choose Rate Plans that offer video optimization as a customer-controlled feature (e.g., \u201cBinge On\u201d). When this feature is enabled, on-device video is typically delivered at DVD quality (up to 1.5 Mbps speeds, generally 480p or better).</p>\n\n<p>Some qualifying video providers may choose to opt-out of the Binge On program, see listing at <a href="http://www.t-mobile.com/offer/binge-on-streaming-video.html#" target="_blank">http://www.t-mobile.com/offer/binge-on-streaming-video.html#</a>. The Binge On optimization technology is not applied to the video services of these providers; video from these services will stream at native resolution, and high-speed data consumption will continue as if Binge On were not enabled. Rate Plans that feature this technology allow customers to choose to enable (and disable) video streaming optimization when connected to the cellular network, unless a provider has chosen to opt-out, see listing at <a href="http://www.t-mobile.com/offer/binge-on-streaming-video.html#" target="_blank">http://www.t-mobile.com/offer/binge-on-streaming-video.html#</a>.</p>\n\n<p>For more information about video optimization, <a href="http://www.T-Mobile.com/OpenInternet" target="_blank">click here</a>.</p>\n\n<br clear="all">\n\n<p style="TEXT-ALIGN: center"><a id="EPPUSYD" name="EPPUSYD"></a><strong>Examples of Permitted and Prohibited Uses of the Service and Your Device</strong></p>\n\n<p>Permitted uses include:</p>\n\n<ul>\n <li>Voice calls;</li>\n\n <li>Web browsing;</li>\n\n <li>Messaging;</li>\n\n <li>Email;</li>\n\n <li>Streaming music;</li>\n\n <li>Uploading and downloading applications and content to and from the Internet or third party stores;</li>\n\n <li>Using applications and content without excessively contributing to network congestion; and</li>\n\n <li style="LIST-STYLE-TYPE: none">\n <p>Tethering your Device to other non-harmful devices pursuant to the terms and conditions and allotments of your Data Plan.</p>\n </li>\n</ul>\n\n<p>Unless explicitly permitted by your Rate Plan or Data Plan, you are not permitted to use your Device or the Service in a way that we determine:</p>\n\n<ul>\n <li>Uses a repeater or signal booster other than one we provide to you;</li>\n\n <li>Compromises network security or capacity, degrades network performance, uses malicious software or \x93malware\x94, hinders other customers\x92 access to the network, or otherwise adversely impacts network service levels or legitimate data flows;</li>\n\n <li>Uses applications which automatically consume unreasonable amounts of available network capacity;</li>\n\n <li>Uses applications which are designed for unattended use, automatic data feeds, automated machine-to-machine connections, or applications that are used in a way that degrades network capacity or functionality;</li>\n\n <li>Misuses the Service, including "spamming" or sending abusive, unsolicited, or other mass automated communications;</li>\n\n <li>Accesses the accounts of others without authority;</li>\n\n <li>Results in more than 50% of your voice and/or data usage being off-net (i.e., connected to another provider\x92s network) for any 3 billing cycles within any 12 month period;</li>\n\n <li>Results in unusually high usage (specifically, more data usage than what 97% of all customers use in a month, based on recent historical averages (updated quarterly)) and the majority of your data usage being Smartphone Mobile HotSpot (tethering) usage for any 3 billing cycles within any 6 month period;</li>\n\n <li>Resells the Service, either alone or as part of any other good or service;</li>\n\n <li>Tampers with, reprograms, alters, or otherwise modifies your Device to circumvent any of our policies or violate anyone\x92s intellectual property rights;</li>\n\n <li>Causes harm or adversely affects us, the network, our customers, employees, business, or any other person;</li>\n\n <li>Conflicts with applicable law;</li>\n\n <li>Is not in accordance with these T&amp;Cs; or</li>\n\n <li>Attempts or assists or facilitates anyone else in any of the above activities.</li>\n</ul>\n\n<br clear="all">\n\n<p style="TEXT-ALIGN: center"><a id="Lost or Stolen" name="Lost%20or%20Stolen"></a><strong>Information about What Happens if Your Device is Lost or Stolen</strong></p>\n\n<p>Once you notify us that your Device has been lost or stolen, we will suspend your Service and you will not be responsible for additional usage charges incurred in excess of your Rate Plan Charges, applicable taxes, fees, and surcharges. If Charges are incurred before you notify us, you are not liable for Charges you did not authorize. However, the fact that your Device or acc ount was used is some evidence of authorization. You may request us to investigate Charges you believe were unauthorized. We may ask you to provide information and you may submit information to support your request. If we determine the Charges were unauthorized, we will credit your account. If we determine the Charges were authorized, we will inform you within 30 days and you will remain responsible for the Charges. If you request that we not suspend your Service, you will remain responsible for all Charges incurred. We may prevent a lost or stolen Device from registering on our and other networks.</p>\n\n<p>You can click <a href="http://www.ctia.org/policy-initiatives/voluntary-guidelines/smartphone-anti-theft-voluntary-commitment" target="_blank">here</a> to learn about additional anti-theft measures that may apply to you.</p>\n\n<br clear="all">\n\n<p style="TEXT-ALIGN: center"><a id="Billing Information" name="Billing%20Information"></a><strong>Billing Information</strong></p>\n\n<p>Please read the following for more information about how we bill for calls, data usage and messaging, Wi-Fi usage, third party charges, taxes, and surcharges.</p>\n\n<p><strong>Usage</strong> : Airtime usage is measured from the time the network begins to process a call (before the phone rings or the call is answered) through its termination of the call (after you hang up). For voice calls, we round up any fraction of a minute to the next full minute. Depending upon your Rate Plan, data usage may be rounded at the end of each data session, at the end of your billing cycle, and/or at the time you switch data plans. You may be charged for more than one call/message when you use certain features resulting in multiple inbound or outbound calls/messages (such as call forwarding, call waiting, voicemail, conference calling, and multi-party messaging). You will be charged for text, instant or picture messages, and email whether read or unread, sent or received, solicited or unsolicited. We use filters to block spam messages, but we do not guarantee that you will not receive spam or other unsolicited messages. Additional blocking options are available at <a style="TEXT-DECORATION: none" href="http://www.my.t-mobile.com/" target="_blank">www.my.T-Mobile.com</a>. Most usage and Charges incurred during a billing cycle will be included in your bill for that cycle. Some usage and Charges may be delayed to a later billing cycle, which may cause you to exceed Rate Plan allotments in a later billing cycle. Unused Rate Plan allotments expire at the end of your billing cycle. You may be billed additional Charges for certain features and services. Charges for Wi-Fi usage may differ; see your Rate Plan for more details.</p>\n\n<p><strong>Taxes:</strong> You agree to pay all taxes and fees imposed by governments or governmental entities. We may not give advance notice of changes to these charges. To determine taxes &amp; fees, we use the street address you identified as your Place of Primary Use (\x93PPU\x94). The PPU for <strong>Puerto Rico customers</strong> must be in Puerto Rico. If you did not identify the correct PPU, or if you provided an address, such as a PO Box, that is not a recognized street address, does not allow us to identify the applicable taxing jurisdiction(s) or does not reflect the Service area associated with your telephone number, you may be assigned a default location for tax purposes. Except as may be otherwise required by law, in the event you dispute your PPU or the location we assigned you and the resulting taxes or fees applied on your bill, you must request a refund of the disputed tax or fee within 60 days of the date of our bill containing such tax or fee. Regardless of any Rate Plan guarantee, taxes and fees may change from time to time without notice.</p>\n\n<p>\n <strong>Surcharges</strong> : You agree to pay all surcharges. Surcharges are not mandated or imposed on you by law, they are T-Mobile Charges that are determined, collected and retained by us. The components and amounts of the Surcharges are subject to change without notice. Surcharges include charges, costs, fees and certain taxes that we incur to provide Services (and are not government taxes or fees imposed directly on our customers). Examples include general and administrative fees (such as certain costs we incur to provide Service) as well as governmental-related assessments (such as Federal or State Universal Service fees, regulatory or public safety charges, environmental fees, and gross receipts taxes). Surcharges assessed to you will vary depending on the type of Service and the Rate Plan you have. Surcharges will apply whether or not you benefit from the programs, activities or services included in the Surcharge. When Surcharges are assessed in connection with your Service, you can find the Surcharges detailed in either the \x93Taxes, Fees &amp; Surcharges\x94, \x93T-Mobile Fees and Charges\x94 or the \x93Other Charges\x94 sections of your bill or at your MyT-Mobile.com account. Regardless of any Rate Plan guarantee, Surcharges may change from time to time without notice.\n <br clear="all">\n</p>\n\n<p style="TEXT-ALIGN: center"><a id="License" name="License"></a><strong>Additional Software License Terms</strong></p>\n\n<p>Except as permitted by applicable law, you may not assign, transfer, sublicense, copy, reproduce, redistribute, resell, modify, decompile, attempt to derive the source code of, or reverse engineer all or any part of the Software, or alter, disable or circumvent any digital rights management security features embedded in the Software. The Software may not be transferable from one Device to another Device. You may not create derivative works of all or any part of the Software. You agree the Software contains proprietary content and information owned by T-Mobile, its licensors, and/or other third parties. T-Mobile, its licensors, and such other third parties reserve the right to change, suspend, terminate, remove, impose limits on the use or access to, or disable access to, the Software at any time without notice and will have no liability for doing so. You agree that your violation of the Software license harms T-Mobile, its licensors, and/or other third parties, which cannot be fully redressed by money damages, and that T-Mobile, its licensors, and such other third parties shall be entitled to immediate injunctive relief in addition to all other remedies available.</p>\n\n<br clear="all">\n\n<p style="TEXT-ALIGN: center"><a id="Additional Terms" name="Additional%20Terms"></a><strong>Additional Terms</strong></p>\n\n<p>If we don\'t enforce our rights under this Agreement in one instance, that doesn\'t mean we won\'t or can\'t enforce those rights in any other instance. Except as provided in the Section entitled \x93How Do I Resolve Disputes with T-Mobile\x94, if any part of the Agreement is held invalid that part may be severed from the Agreement.</p>\n\n<p>You can\'t assign or transfer the Agreement or any of your rights or duties under it without our written consent. We may assign or transfer all or part of the Agreement, or your debts to us, without notice. You understand that the assignment or transfer of all or any part of this Agreement or your debt will not change or relieve your obligations under this Agreement.</p>\n\n<p>The Agreement is the entire agreement between you and us regarding the rights you have with respect to your Service, except as provided by law, and you cannot rely on any other documents or statements by any sales or service representatives or other agents.</p>\n\n<p>The original version of the Agreement is in English. To the extent there are conflicts between the English version and any other language version, the English version will control.</p>\n\n<p>If you believe that any material residing on our system or network infringes your copyright, notify our Designated Agent by using the Digital Millennium Copyright Act (DMCA) notice procedure described at <a style="TEXT-DECORATION: none" href="http://www.t-mobile.com/DMCA.htm" target="_blank">www.T-Mobile.com/DMCA.htm</a> (<a style="TEXT-DECORATION: none" href="http://es.t-mobile.com/DMCA.htm" target="_blank">es.T-Mobile.com/DMCA.htm</a> for our Spanish website). Our Designated Agent is Christina Kirkpatrick, 12920 S.E. 38th Street, Bellevue, WA 98006; copyrightagent@t-mobile.com; phone: <span class="tmo_tfn_number">425-383-4000</span>. There are substantial penalties for sending false notices. It is our policy, in appropriate circumstances and in its sole judgment, to suspend or terminate the Service of any subscriber, account holder, or user who is deemed to be a repeat or blatant infringer of copyrights.</p></div>\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t<div class="print"></div>\r\n\t\t\t</div>'} Error during info_callback Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 421, in dataReceived self._write(bytes) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 569, in _write sent = self._tlsConnection.send(toSend) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 1255, in send result = _lib.SSL_write(self._ssl, buf, len(buf)) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) --- <exception caught here> --- File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1154, in infoCallback return wrapped(connection, where, ret) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1253, in _identityVerifyingInfoCallback verifyHostname(connection, self._hostnameASCII) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 44, in verify_hostname cert_patterns=extract_ids(connection.get_peer_certificate()), File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 73, in extract_ids ids.append(DNSPattern(n.getComponent().asOctets())) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/_common.py", line 156, in __init__ "Invalid DNS pattern {0!r}.".format(pattern) service_identity.exceptions.CertificateError: Invalid DNS pattern '149.154.167.99'. CRITICAL:twisted:Error during info_callback Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 421, in dataReceived self._write(bytes) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 569, in _write sent = self._tlsConnection.send(toSend) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 1255, in send result = _lib.SSL_write(self._ssl, buf, len(buf)) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) --- <exception caught here> --- File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1154, in infoCallback return wrapped(connection, where, ret) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1253, in _identityVerifyingInfoCallback verifyHostname(connection, self._hostnameASCII) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 44, in verify_hostname cert_patterns=extract_ids(connection.get_peer_certificate()), File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 73, in extract_ids ids.append(DNSPattern(n.getComponent().asOctets())) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/_common.py", line 156, in __init__ "Invalid DNS pattern {0!r}.".format(pattern) service_identity.exceptions.CertificateError: Invalid DNS pattern '149.154.167.99'. 2017-02-26 16:56:18 [twisted] CRITICAL: Error during info_callback Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 421, in dataReceived self._write(bytes) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/protocols/tls.py", line 569, in _write sent = self._tlsConnection.send(toSend) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 1255, in send result = _lib.SSL_write(self._ssl, buf, len(buf)) File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) --- <exception caught here> --- File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1154, in infoCallback return wrapped(connection, where, ret) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1253, in _identityVerifyingInfoCallback verifyHostname(connection, self._hostnameASCII) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 44, in verify_hostname cert_patterns=extract_ids(connection.get_peer_certificate()), File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/pyopenssl.py", line 73, in extract_ids ids.append(DNSPattern(n.getComponent().asOctets())) File "/app/.heroku/python/lib/python2.7/site-packages/service_identity/_common.py", line 156, in __init__ "Invalid DNS pattern {0!r}.".format(pattern) service_identity.exceptions.CertificateError: Invalid DNS pattern '149.154.167.99'. From cffi callback <function infoCallback at 0x3f7eb90>: Traceback (most recent call last): File "/app/.heroku/python/lib/python2.7/site-packages/OpenSSL/SSL.py", line 917, in wrapper callback(Connection._reverse_mapping[ssl], where, return_code) File "/app/.heroku/python/lib/python2.7/site-packages/twisted/internet/_sslverify.py", line 1158, in infoCallback connection.get_app_data().failVerification(f) AttributeError: 'NoneType' object has no attribute 'failVerification' INFO:scrapy.core.engine:Closing spider (finished) 2017-02-26 16:56:18 [scrapy] INFO: Closing spider (finished) DEBUG:page_watcher_scraper.pipelines:closing policy file 2017-02-26 16:56:18 [page_watcher_scraper.pipelines] DEBUG: closing policy file INFO:scrapy.statscollectors:Dumping Scrapy stats: {'downloader/request_bytes': 498, 'downloader/request_count': 2, 'downloader/request_method_count/GET': 2, 'downloader/response_bytes': 120430, 'downloader/response_count': 2, 'downloader/response_status_count/200': 1, 'downloader/response_status_count/301': 1, 'finish_reason': 'finished', 'finish_time': datetime.datetime(2017, 2, 26, 16, 56, 18, 460097), 'item_scraped_count': 1, 'log_count/CRITICAL': 6, 'log_count/DEBUG': 90, 'log_count/INFO': 52, 'response_received_count': 1, 'scheduler/dequeued': 2, 'scheduler/dequeued/memory': 2, 'scheduler/enqueued': 2, 'scheduler/enqueued/memory': 2, 'start_time': datetime.datetime(2017, 2, 26, 16, 56, 16, 388165)} 2017-02-26 16:56:18 [scrapy] INFO: Dumping Scrapy stats: {'downloader/request_bytes': 498, 'downloader/request_count': 2, 'downloader/request_method_count/GET': 2, 'downloader/response_bytes': 120430, 'downloader/response_count': 2, 'downloader/response_status_count/200': 1, 'downloader/response_status_count/301': 1, 'finish_reason': 'finished', 'finish_time': datetime.datetime(2017, 2, 26, 16, 56, 18, 460097), 'item_scraped_count': 1, 'log_count/CRITICAL': 6, 'log_count/DEBUG': 90, 'log_count/INFO': 52, 'response_received_count': 1, 'scheduler/dequeued': 2, 'scheduler/dequeued/memory': 2, 'scheduler/enqueued': 2, 'scheduler/enqueued/memory': 2, 'start_time': datetime.datetime(2017, 2, 26, 16, 56, 16, 388165)} INFO:scrapy.core.engine:Spider closed (finished) 2017-02-26 16:56:18 [scrapy] INFO: Spider closed (finished) INFO:scrapy.core.engine:Closing spider (finished) 2017-02-26 16:56:18 [scrapy] INFO: Closing spider (finished) DEBUG:page_watcher_scraper.pipelines:closing policy file 2017-02-26 16:56:18 [page_watcher_scraper.pipelines] DEBUG: closing policy file INFO:scrapy.statscollectors:Dumping Scrapy stats: {'downloader/request_bytes': 568, 'downloader/request_count': 2, 'downloader/request_method_count/GET': 2, 'downloader/response_bytes': 67399, 'downloader/response_count': 2, 'downloader/response_status_count/200': 1, 'downloader/response_status_count/301': 1, 'finish_reason': 'finished', 'finish_time': datetime.datetime(2017, 2, 26, 16, 56, 18, 466488), 'item_scraped_count': 1, 'log_count/CRITICAL': 6, 'log_count/DEBUG': 84, 'log_count/INFO': 49, 'response_received_count': 1, 'scheduler/dequeued': 2, 'scheduler/dequeued/memory': 2, 'scheduler/enqueued': 2, 'scheduler/enqueued/memory': 2, 'start_time': datetime.datetime(2017, 2, 26, 16, 56, 16, 398443)} 2017-02-26 16:56:18 [scrapy] INFO: Dumping Scrapy stats: {'downloader/request_bytes': 568, 'downloader/request_count': 2, 'downloader/request_method_count/GET': 2, 'downloader/response_bytes': 67399, 'downloader/response_count': 2, 'downloader/response_status_count/200': 1, 'downloader/response_status_count/301': 1, 'finish_reason': 'finished', 'finish_time': datetime.datetime(2017, 2, 26, 16, 56, 18, 466488), 'item_scraped_count': 1, 'log_count/CRITICAL': 6, 'log_count/DEBUG': 84, 'log_count/INFO': 49, 'response_received_count': 1, 'scheduler/dequeued': 2, 'scheduler/dequeued/memory': 2, 'scheduler/enqueued': 2, 'scheduler/enqueued/memory': 2, 'start_time': datetime.datetime(2017, 2, 26, 16, 56, 16, 398443)} INFO:scrapy.core.engine:Spider closed (finished) 2017-02-26 16:56:18 [scrapy] INFO: Spider closed (finished) DEBUG:scrapy.core.engine:Crawled (200) <GET https://privacy.microsoft.com/en-us/privacystatement> (referer: None) 2017-02-26 16:56:18 [scrapy] DEBUG: Crawled (200) <GET https://privacy.microsoft.com/en-us/privacystatement> (referer: None) DEBUG:policies:in handle response 2017-02-26 16:56:18 [policies] DEBUG: in handle response DEBUG:policies:wroten log ok /app/log/2017-02-26T16-56-16_ok_url.log 2017-02-26 16:56:18 [policies] DEBUG: wroten log ok /app/log/2017-02-26T16-56-16_ok_url.log DEBUG:page_watcher_scraper.util:{'item': 'privacy.microsoft.com_en-us_privacystatement', 'name': 'policies', 'time': '2017-02-26T16-56-18'} 2017-02-26 16:56:18 [page_watcher_scraper.util] DEBUG: {'item': 'privacy.microsoft.com_en-us_privacystatement', 'name': 'policies', 'time': '2017-02-26T16-56-18'} DEBUG:page_watcher_scraper.util:saving html /app/html/2017-02-26T16-56-18-policies-privacy.microsoft.com_en-us_privacystatement.html 2017-02-26 16:56:18 [page_watcher_scraper.util] DEBUG: saving html /app/html/2017-02-26T16-56-18-policies-privacy.microsoft.com_en-us_privacystatement.html DEBUG:page_watcher_scraper.pipelines:writing policy to file /app/page-watcher-data/microsoft/skype/privacy_policy.txt 2017-02-26 16:56:18 [page_watcher_scraper.pipelines] DEBUG: writing policy to file /app/page-watcher-data/microsoft/skype/privacy_policy.txt DEBUG:scrapy.core.scraper:Scraped from <200 https://privacy.microsoft.com/en-us/privacystatement> {'content': u'<div class="grid"><div class="row m-b-xl"><div class="col-1-1"><div class="row"><div class="l-col-10-12 xl-col-20-24"><h1>Microsoft Privacy Statement</h1><div class="Lastupdated"><span id="psp_last_updated">Last Updated:</span><span class="body-tight-2" id="psp_last_updated"> February 2017</span><span class="m-l-md"><a target="_blank" class="mscom-link" title="what\'s new" href="https://go.microsoft.com/fwlink/p/?LinkId=780766">\r\n What\'s new?\r\n </a></span></div></div><div class="l-col-2-12 xl-col-4-24"><div class="expand_collapse m-t-xl"><a id="expand_all_icon" style="color: black; text-decoration: none; display: inline-block;" href="#"><i class="icon-chevron-down m-r-md"></i></a><a title="Expand All" id="psp_expand_all" style="display: inline;" href="#">Expand All</a><a id="collapse_all_icon" style="color: black; text-decoration: none; display: none;" href="#"><i class="icon-chevron-up m-r-md"></i></a><a title="Collapse All" id="psp_collapse_all" style="display: none;" href="#">Collapse All</a></div><div class="div_print m-b-md m-t-md"><a title="Print" href="javascript:void(0)"><img src="https://c.s-microsoft.com/en-us/CMSImages/print-icon.png?version=60ebb5de-511c-db20-3795-563c739c5e12" class="mscom-image" alt="print-icon" title="print-icon" width="16" height="16"></a><a title="Print" class="m-l-md" id="psp_print" href="javascript:void(0)">Print</a></div></div></div></div></div><div class="row"><div class="col-1-1"><div class="row header_content m-b-bl"><div class="xl-col-18-24"><div class="m-t-xl;m-b-bl"><span class="Description" id="ShortDescription" loc="true"><p>Your privacy is important to us. This privacy statement explains what personal data we collect from you and how we use it. We encourage you to read the summaries below and to click on "Learn More" if you\'d like more information on a particular topic.</p><p>The product-specific details sections provide additional information relevant to particular Microsoft products. This statement applies to the Microsoft products listed below, as well as other Microsoft products that display this statement. References to Microsoft products in this statement include Microsoft services, websites, apps, software and devices.</p></span></div><div class="m-t-xl" style="display: none;"><p>The most recent version of this privacy statement can be found at aka.ms/privacy.</p></div></div></div></div></div><div class="row"><div class="col-1-1"><div class="row full_content"><div class="nav_content xl-col-7-24 m-col-8-24 hide-xs show-m"><div id="menu_cookie_div"><div class="div_side_comp"></div><div class="gcc_cookies m-b-lg m-t-bl m-r-bl"><div class="gcc_cookiesHeadergb caption-2"><span id="gcc_cookiesHeaderText">Cookies</span></div><div class="gcc_cookiesContent caption"><p>Most Microsoft Sites use "cookies," small text files that can be read by a web server in the domain that put the cookie on your hard drive. We may use cookies to store your preferences and settings; help with sign-in; provide targeted ads; and analyze site operations. <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">Click here to learn more.</a></p></div></div><div class="gcc_cookies m-b-lg m-t-bl m-r-bl"><div class="gcc_cookiesHeadergb caption-2"><span id="gcc_cookiesHeaderText">EU-U.S. Privacy Shield</span></div><div class="gcc_cookiesContent caption"><p>Microsoft participates in the EU-U.S. Privacy Shield framework. To learn more, <a class="mscom-link" href="https://www.privacyshield.gov/welcome">Click here.</a></p></div></div><!--\r\n<div class="logo_relatedLink_Section caption m-t-lg m-b-bl">\r\n <p>\r\n <a title="FTC Privacy Initiatives" class="relatedLinks" id="MorePrivacyLink2" href="http://www.consumer.ftc.gov/topics/privacy-identity" target="_blank">Privacy Tips from the FTC</a>\r\n </p>\r\n</div>\r\n--><!--<div class="gcl_safelogo"><div class="selfCertify caption m-b-md">\r\n <a id="psp_we_self_certify_compliance_with" href="https://safeharbor.export.gov/list.aspx" target="_blank"></a>\r\n </div><a href="http://export.gov/safeharbor/" target="_blank"><mscom:image title="safeharbor" instancename="safeharbor" controltheme="default" md:payloadguid="46d04be5-e74a-4b41-ad79-1e3d2a298ca7" alt="safeharbo" usedatasource="false" noheightwidth="false" sprite="false" spritegroup="default"></mscom:image></a></div>--></div></div><div class="body_content m-col-16-24 xl-col-12-24"><div class="div_content"><div id="divModuleDescriptionList"><div class="divModuleDescription"><br><span id="Header">Personal Data We Collect</span><span id="navigationHeader">Personal Data We Collect</span><span id="moduleName">mainpersonaldatawecollect</span><div class="printsummary" style="display: block;">\r\n Summary\r\n </div><span class="Description" id="ShortDescription"><span><p>Microsoft collects data to operate effectively and provide you the best experiences with our products. You provide some of this data directly, such as when you create a Microsoft account, submit a search query to Bing, speak a voice command to Cortana, upload a document to OneDrive, purchase an MSDN subscription, sign up for Office 365, or contact us for support. We get some of it by recording how you interact with our products by, for example, using technologies like <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">cookies</a>, and receiving error reports or usage data from software running on your device. We also obtain data from third parties.</p></span></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>Microsoft collects data to operate effectively and provide you the best experiences with our products. You provide some of this data directly, such as when you create a Microsoft account, submit a search query to Bing, speak a voice command to Cortana, upload a document to OneDrive, purchase an MSDN subscription, sign up for Office 365, or contact us for support. We get some of it by recording how you interact with our products by, for example, using technologies like\r\n <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">cookies</a>, and receiving error reports or usage data from software running on your device.</p><p>We also obtain data from third parties. For example, we supplement the data we collect by purchasing demographic data from other companies. We also use services from other companies to help us determine a location based on your IP address in order to customize certain products to your location.</p><p>You have choices about the data we collect. When you are asked to provide personal data, you may decline. But if you choose not to provide data that is necessary to provide a product or feature, you may not be able to use that product or feature.</p><p>The data we collect depends on the products and features you use, and can include the following:</p><p><strong>Name and contact data</strong>. We collect your first and last name, email address, postal address, phone number, and other similar contact data.\r\n</p><p><strong>Credentials</strong>. We collect passwords, password hints, and similar security information used for authentication and account access.</p><p><strong>Demographic data</strong>. We collect data about you such as your age, gender, country, and preferred language.</p><p><strong>Payment data</strong>. We collect data necessary to process your payment if you make purchases, such as your payment instrument number (such as a credit card number), and the security code associated with your payment instrument.</p><p><strong>Usage data</strong>. We collect data about how you and your device interact with Microsoft and our products. For example, we collect:</p><ul><li><em>Product use data</em>. We collect data about the features you use, the items you purchase, and the web pages you visit. This data includes your voice and text search queries or commands to Bing, Cortana, and our chat bots.</li><li><em>Device data</em>. We collect data about your device and the network you use to connect to our products. It includes data about the operating systems and other software installed on your device, including product keys. It also includes IP address, device identifiers (such as the IMEI number for phones), regional and language settings.</li><li><em>Error reports and performance data</em>. We collect data about the performance of the products and any problems you experience with them. This data helps us to diagnose problems in the products you use, and to improve our products and provide solutions. Depending on your product and settings, error reports can include data such as the type or severity of the problem, details of the software or hardware related to an error, contents of files you were using when an error occurred, and data about other software on your device.</li><li><em>Support Data</em>. When you engage Microsoft for support, we collect data about you and your hardware, software, and other details related to the support incident. Such data includes contact or authentication data, the content of your chats and other communications with Microsoft support, data about the condition of the machine and the application when the fault occurred and during diagnostics, and system and registry data about software installations and hardware configurations.</li></ul><p><strong>Interests and favorites</strong>. We collect data about your interests and favorites, such as the teams you follow in a sports app, the stocks you track in a finance app, or the favorite cities you add to a weather app. In addition to those you explicitly provide, your interests and favorites may also be inferred or derived from other data we collect.</p><p><strong>Contacts and relationships</strong>. We collect data about your contacts and relationships if you use a Microsoft product to manage contacts, or to communicate or interact with other people or organizations.</p><p><strong>Location data</strong>. We collect data about your location, which can be either precise or imprecise. Precise location data can be Global Position System (GPS) data, as well as data identifying nearby cell towers and Wi-Fi hotspots, we collect when you enable location-based products or features. Imprecise location data includes, for example, a location derived from your IP address or data that indicates where you are located with less precision, such as at a city or postal code level.</p><p><strong>Content</strong>. We collect content of your files and communications when necessary to provide you with the products you use. For example, if you receive an email using Outlook.com or Exchange Online, we need to collect the content of that email to deliver it to your inbox, display it to you, enable you to reply to it, and store it for you until you choose to delete it. Examples of this data include: the content of your documents, photos, music, or videos you upload to a Microsoft service such as OneDrive, as well as the content of your communications sent or received using Microsoft products such Outlook.com or Skype, including the:</p><ul><li>subject line and body of an email,</li><li>text or other content of an instant message,</li><li>audio and video recording of a video message, and</li><li>audio recording and transcript of a voice message you receive or a text message you dictate.</li></ul><p>We also collect the content of messages you send to us, such as feedback and product reviews you write, or questions and information you provide for customer support. When you contact us, such as for customer support, phone conversations or chat sessions with our representatives may be monitored and recorded. If you enter our retail stores or other facilities, your image may be captured by our security cameras.</p><p>Product-specific sections below describe data collection practices applicable to use of those products.</p></span></div><div class="divModuleDescription"><span id="Header">How We Use Personal Data</span><span id="navigationHeader">How We Use Personal Data</span><span id="moduleName">mainhowweusepersonaldatamodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Microsoft uses the data we collect to provide you the products we offer, which includes using data to improve and personalize your experiences. We also may use the data to communicate with you, for example, informing you about your account, security updates and product information. And we use data to help show more relevant ads, whether in our own products like MSN and Bing, or in products offered by third parties. However, we do not use what you say in email, chat, video calls or voice mail, or your documents, photos or other personal files to target ads to you.</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>Microsoft uses the data we collect to provide you the products we offer, which includes using data to improve and personalize your experiences. We also may use the data to communicate with you, for example, informing you about your account, security updates and product information. And we use data to help show more relevant ads, whether in our own products like MSN and Bing, or in products offered by third parties. However, we do not use what you say in email, chat, video calls or voice mail, or your documents, photos or other personal files to target ads to you.</p><p>\r\n Microsoft uses the data we collect for three basic purposes, described in more detail below: (1) to operate our business and provide (including improving and personalizing) the products we offer, (2) to send communications, including promotional communications, and (3) for some products, to show advertising.\r\n</p><p>\r\n In carrying out these purposes, we combine data we collect to give you a more seamless, consistent and personalized experience. For example,\r\n <a class="mscom-link" href="#maincortanamodule">Cortana</a> can use the favorite sports teams you add to the\r\n <a class="mscom-link" href="#mainmainmodule">MSN</a> Sports app to provide information relevant to your interests, or\r\n <a id="mainwindowsstoremodulefromHowWeUsePersonalData" class="mscom-link" href="#mainwindowsstoremodule">Windows Store</a> can use information about the apps and services you use to make personalized app recommendations. However, to enhance privacy, we have built in technological and procedural safeguards designed to prevent certain data combinations. For example, we store data we collect from you when you are unauthenticated (not signed in) separately from any account information that directly identifies you, such as your name, email address or phone number.\r\n</p><p><strong>Providing and improving our products</strong>. We use data to provide and improve the products we offer and perform essential business operations. This includes operating the products, maintaining and improving the performance of the products, including developing new features, research, and providing customer support. Examples of such uses include the following.\r\n</p><ul><li><strong>Providing the Products</strong>. We use data to carry out your transactions with us and to provide our products to you. Often, those products include personalized features and recommendations that enhance your productivity and enjoyment, and tailor your product experiences based on your activities, interests and location.\r\n </li><li><strong>Customer support</strong>. We use data to diagnose product problems, repair customers\' devices, and provide other customer care and support services.\r\n </li><li><strong>Product activation</strong>. We use data - including device and application type, location, and unique device, application, network and subscription identifiers - to activate software and devices that require activation.\r\n </li><li><strong>Product Improvement</strong>. We use data to continually improve our products, including adding new features or capabilities, such as using error reports to improve security features, using search queries and clicks in Bing to improve the relevancy of the search results, using usage data to determine what new features to prioritize, or using audio recordings from voice input features to improve speech recognition accuracy.\r\n </li><li><strong>Security, Safety and Dispute Resolution</strong>. We use data to protect the security and safety of our products and our customers, to detect and prevent fraud, to confirm the validity of software licenses, to resolve disputes and enforce our agreements. Our security features and products can disrupt the operation of malicious software and notify users if malicious software is found on their devices. For example, many of our communications and file syncing products systematically scan content in an automated manner to identify suspected spam, viruses, abusive actions, or URLs that have been flagged as fraud, phishing or malware links; and we may block delivery of a communication or remove content if it violates our terms.\r\n </li><li><strong>Business Operations</strong>. We use data to develop aggregate analysis and business intelligence that enable us to operate, protect, make informed decisions, and report on the performance of our business.\r\n </li></ul><p><strong>Communications</strong>. We use data we collect to deliver and personalize our communications with you. For example, we may contact you by email or other means to inform you when a subscription is ending, let you know when security updates are available, remind you about items left in your online shopping cart, update you or inquire about a service or repair request, invite you to participate in a survey, or tell you that you need to take action to keep your account active. Additionally, you can sign up for email subscriptions and choose whether you wish to receive promotional communications from Microsoft by email, SMS, physical mail, and telephone. For information about managing email subscriptions and promotional communications, please visit the\r\n <a class="mscom-link" href="#mainhowtoaccesscontrolyourdatamodule">Access and Controls</a> section of this privacy statement.\r\n</p><p><strong>Advertising</strong>. Many of our products are supported by advertising. We share data we collect with third parties such as AOL and AppNexus so that they can select and deliver some of the ads you see on our sites and apps, as well as other sites and apps serviced by these partners. The ads that you see may be selected based on your current location, search query, or the content you are viewing. Other ads are targeted based on your likely interests or other information learned about you over time using demographic data, search queries, interests and favorites, usage data from our own sites and apps and the sites and apps of our advertisers and partners, and location data - which we refer to as "interest-based advertising" in this statement. To provide interest-based advertising, we combine cookies placed on your device using information that we collect (such as IP address) when your browser interacts with our websites. If you opt out of receiving interest-based advertising, data associated with these cookies will not be used. Microsoft does not use what you say in email, chat, video calls or voice mail, or your documents, photos or other personal files to target ads to you. <strong>You can opt out of receiving interest-based advertising from Microsoft by visiting our <a target="_blank" class="mscom-link" href="http://go.microsoft.com/fwlink/?LinkID=286759">opt-out page</a></strong>. More information about advertising controls is available in the\r\n <a class="mscom-link" href="#mainhowtoaccesscontrolyourdatamodule">Access and Controls</a> section of this privacy statement. Further details regarding our advertising-related uses of data include:\r\n</p><ul><li><strong>Advertising Industry Best Practices and Commitments</strong>. Microsoft is a member of the\r\n <a target="_blank" class="mscom-link" href="http://www.networkadvertising.org/">Network Advertising Initiative</a> (NAI) and adheres to the NAI Code of Conduct. We also adhere to the following self-regulatory programs:\r\n\r\n <ul><li>In the US:\r\n <a target="_blank" class="mscom-link" href="http://go.microsoft.com/fwlink/?LinkId=304134">Digital Advertising Alliance (DAA)</a></li><li>In Europe:\r\n <a target="_blank" class="mscom-link" href="http://www.youronlinechoices.com/">European Interactive Digital Advertising Alliance (EDAA)</a></li><li>In Canada:\r\n <a target="_blank" class="mscom-link" href="http://www.youradchoices.ca/">Ad Choices: Digital Advertising Alliance of Canada (DAAC)</a> /\r\n <a target="_blank" class="mscom-link" href="http://www.youradchoices.ca/fr">Choix de Pub: l\'Alliance de la publicit\xe9 num\xe9rique du Canada (DAAC)</a></li></ul></li><li><strong>Health-Related Ad Targeting</strong>. In the United States, we provide interest-based advertising based on a limited number of standard, non-sensitive health-related interest categories, including allergies, arthritis, cholesterol, cold and flu, diabetes, gastrointestinal health, headache / migraine, healthy eating, healthy heart, men\u2019s health, oral health, osteoporosis, skin health, sleep, and vision / eye care. We will also target ads based on custom, non-sensitive health-related interest categories as requested by advertisers.\r\n </li><li><strong>Children and Advertising</strong>. We do not deliver interest-based advertising to children whose birthdate in their Microsoft account identifies them as under 13 years of age.\r\n </li><li><strong>Data Retention</strong>. For interest-based advertising, we retain data for no more than 13 months, unless we obtain your consent to retain the data longer.\r\n </li><li><strong>Data Sharing</strong>. In some cases, we share with advertisers reports about the data we have collected on their sites or ads. Advertisers may choose to place our\r\n <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">web beacons</a>\xa0on their sites in order to allow Microsoft to collect information on their sites such as activities, purchases and visits; we use this data on behalf of our advertising customers to help target their ads. We also share data directly with service providers (such as AOL and AppNexus) to permit them to provide services on our behalf or to partner with us in selecting and serving ads for our advertising partners.\r\n </li><li><strong>Data Collected by Other Advertising Companies</strong>. Advertisers sometimes include their own\r\n <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">web beacons</a> (or those of their other advertising partners) within their advertisements that we display, enabling them to set and read their own\r\n <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">cookie</a>. Additionally, Microsoft partners with third-party ad companies to help provide some of our advertising services, and we also allow other third-party ad companies to display advertisements on our sites. These third parties may place cookies on your computer and collect data about your online activities across websites or online services. These companies currently include, but are not limited to:\r\n <a target="_blank" class="mscom-link" href="http://www.a9.com/">A9</a>,\r\n <a target="_blank" class="mscom-link" href="http://advertising.aol.com/">AOL Advertising</a>,\r\n <a target="_blank" class="mscom-link" href="http://www.appnexus.com/">AppNexus</a>,\r\n <a target="_blank" class="mscom-link" href="http://www.criteo.com/">Criteo</a>,\r\n <a target="_blank" class="mscom-link" href="https://www.facebook.com/help/568137493302217">Facebook</a>,\r\n <a target="_blank" class="mscom-link" href="http://www.mediamath.com/">MediaMath</a>,\r\n <a target="_blank" class="mscom-link" href="http://ad-choices.nuggad.net/">nugg.adAG</a>,\r\n <a target="_blank" class="mscom-link" href="http://rocketfuel.com/">Rocket Fuel</a>,\r\n <a target="_blank" class="mscom-link" href="http://advertising.yahoo.com/">Yahoo!</a>. You may find more information on each company\'s practices, including the choices it offers, by clicking on the company names above. Many of them are also members of the\r\n <a target="_blank" class="mscom-link" href="http://www.networkadvertising.org/managing/opt_out.aspx">NAI</a> or\r\n <a target="_blank" class="mscom-link" href="http://www.aboutads.info/choices/">DAA</a>, which each provide a simple way to opt out of ad targeting from participating companies.\r\n </li></ul></span></div><div class="divModuleDescription"><span id="Header">Reasons We Share Personal Data</span><span id="navigationHeader">Reasons We Share Personal Data</span><span id="moduleName">mainreasonswesharepersonaldatamodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\nWe share your personal data with your consent or as necessary to complete any transaction or provide any product you have requested or authorized. We also share data with Microsoft-controlled affiliates and subsidiaries; with vendors working on our behalf; when required by law or to respond to legal process; to protect our customers; to protect lives; to maintain the security of our products; and to protect the rights or property of Microsoft.\r\n</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>\r\n We share your personal data with your consent or as necessary to complete any transaction or provide any product you have requested or authorized. For example, we share your content with third parties when you tell us to do so, such as when you send an email to a friend, share photos and documents on OneDrive, or link accounts with another service. When you provide payment data to make a purchase, we will share payment data with banks and other entities that process payment transactions or provide other financial services, and for fraud prevention and credit risk reduction. \r\n</p><p>\r\n In addition, we share personal data among Microsoft-controlled affiliates and subsidiaries. We also share personal data with vendors or agents working on our behalf for the purposes described in this statement. For example, companies we\'ve hired to provide customer service support or assist in protecting and securing our systems and services may need access to personal data in order to provide those functions. In such cases, these companies must abide by our data privacy and security requirements and are not allowed to use personal data they receive from us for any other purpose. We may also disclose personal data as part of a corporate transaction such as a merger or sale of assets.\r\n</p><p>\r\n Finally, we will access, transfer, disclose, and preserve personal data, including your content (such as the content of your emails in Outlook.com, or files in private folders on OneDrive), when we have a good faith belief that doing so is necessary to: \r\n</p><ol><li>comply with applicable law or respond to valid legal process, including from law enforcement or other government agencies; </li><li>protect our customers, for example to prevent spam or attempts to defraud users of our products, or to help prevent the loss of life or serious injury of anyone; </li><li>operate and maintain the security of our products, including to prevent or stop an attack on our computer systems or networks; or </li><li>protect the rights or property of Microsoft, including enforcing the terms governing the use of the services - however, if we receive information indicating that someone is using our services to traffic in stolen intellectual or physical property of Microsoft, we will not inspect a customer\'s private content ourselves, but we may refer the matter to law enforcement. </li></ol><p>\r\n For more information about data we disclose in response to requests from law enforcement and other government agencies, please see our Law Enforcement Transparency Report, available at <a target="_blank" class="mscom-link" href="https://microsoft.com/about/corporatecitizenship/en-us/reporting/transparency">microsoft.com/about/corporatecitizenship/en-us/reporting/transparency</a>.\r\n</p><p>\r\n Please note that some of our products include links to products of third parties whose privacy practices differ from Microsoft\'s. If you provide personal data to any of those products, your data is governed by their privacy statements.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">How to Access &amp; Control Your Personal Data</span><span id="navigationHeader">How to Access &amp; Control Your Personal Data</span><span id="moduleName">mainhowtoaccesscontrolyourdatamodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>You can view or edit your personal data online for many Microsoft products. You can also make choices about Microsoft\'s collection and use of your data. How you can access or control your personal data will depend on which products you use.</p><p>You can always choose whether you wish to receive promotional email, SMS messages, telephone calls and postal mail from Microsoft. You can also opt out from receiving interest-based advertising from Microsoft by visiting our <a target="_blank" class="mscom-link" href="http://go.microsoft.com/fwlink/?LinkID=286759">opt-out page</a>.\r\n</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription" loc="true"><p></p><p>\r\n You can view or edit your personal data online for many Microsoft products. You can also make choices about Microsoft\'s collection and use of your data. How you can access or control your personal data will depend on which products you use. For example:\r\n</p><ul><li><strong>Microsoft account</strong>. If you wish to access or edit the profile information and payment information in your\r\n <a class="mscom-link" href="#mainmicrosoftaccountmodule">Microsoft account</a>, change your password, add security information or close your account, you can do so by visiting\r\n <a target="_blank" class="mscom-link" href="https://account.microsoft.com">account.microsoft.com</a>. From here, you can also access controls for other Microsoft products.</li><li><strong>Bing and Cortana</strong>. You can access or clear your Bing search history, redeem Bing Rewards, view and modify interests, and manage other Cortana data at\r\n <a target="_blank" class="mscom-link" href="https://www.bing.com/account/general">www.bing.com/account/general</a>. <strong></strong></li><li><strong>Skype</strong>. If you wish to access or edit the profile information and payment information in your Skype account or change your password, you can sign into your account at\r\n <a target="_blank" class="mscom-link" href="https://login.skype.com/login">login.skype.com/login</a>. </li><li><strong>Xbox</strong>. If you use Xbox Live or Xbox.com, you can view or edit your personal data, including billing and account information, privacy settings, online safety and data sharing preferences by accessing\r\n <a target="_blank" class="mscom-link" href="http://live.xbox.com/MyXbox/Profile">My Xbox</a> on the Xbox console or on the Xbox.com website. </li><li><strong>Microsoft Store</strong>. You can access your Microsoft Store profile and account information by visiting\r\n <a target="_blank" class="mscom-link" href="https://www.microsoftstore.com/">www.microsoftstore.com/</a> and clicking on "View account" or "Order history." </li><li><strong>Microsoft.com</strong>. You can access and update your profile on microsoft.com by visiting the\r\n <a target="_blank" class="mscom-link" href="https://go.microsoft.com/?linkid=317027">Microsoft.com Profile Center</a>. If you have a Microsoft Developer Network public profile, you can access and edit it at\r\n <a target="_blank" class="mscom-link" href="https://connect.microsoft.com/profile.aspx">connect.microsoft.com/profile.a spx</a>.\r\n </li></ul><p>\r\n If you cannot access certain personal data collected by Microsoft via the links above or directly through the Microsoft products you use, you can always contact Microsoft by using our\r\n <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/?LinkId=321116">web form</a>. We will respond to requests to access or delete your personal data within 30 days.\r\n</p><p><strong>Your Communications Preferences</strong></p><p>\r\n You can choose whether you wish to receive promotional communications from Microsoft by email, SMS, physical mail, and telephone. If you receive promotional email or SMS messages from us and would like to opt out, you can do so by following the directions in that message. You can also make choices about the receipt of promotional email, telephone calls, and postal mail by signing in with your personal\r\n <a class="mscom-link" href="#mainmicrosoftaccountmodule">Microsoft account</a>, and viewing your <a class="mscom-link" href="https://go.microsoft.com/fwlink/?LinkId=243191">communication permissions</a> where you can update contact information, manage Microsoft-wide contact preferences, opt out of email subscriptions, and choose whether to share your contact information with Microsoft partners. If you do not have a personal Microsoft account, you can manage your Microsoft email contact preferences by using this <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/?LinkId=243189">web form</a>. These choices do not apply to mandatory service communications that are part of certain Microsoft services, or to surveys or other informational communications that have their own unsubscribe method.\r\n</p><p><strong>Your Advertising Choices</strong></p><p>\r\n You may opt out of receiving interest-based advertising from Microsoft by visiting our\r\n <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/?LinkID=286759">opt-out page</a>. When you opt out, your selection will be stored in a\r\n <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">cookie</a> that is specific to the web browser you are using. The opt-out cookie has an expiration date of five years. If you delete the cookies on your device, you will need to opt out again.\r\n</p><p>You can also link your opt-out choice with your personal Microsoft account. It will then apply on any device where you use\xa0that account, and will continue to apply until someone signs in with a different personal Microsoft account on that device. If you delete the cookies on your device, you will need to sign in again for the settings to apply.</p><p>\r\n For advertising that appears in apps on Windows, you may use the opt-out linked to your personal Microsoft account, or opt out of interest-based advertising by turning off the\r\n <a id="mainadvertisingidmodulefromHowtoAccess" class="mscom-link" href="#mainadvertisingidmodule">advertising ID</a> in Windows Settings.\r\n</p><p>\r\n Because the data used for interest-based advertising is also used for other necessary purposes (including providing our products, analytics and fraud detection), opting out of interest-based advertising does not stop that data from being collected. Nor does it mean you will stop getting ads or see fewer ads. However, if you do opt out, the ads you receive will no longer be interest-based and may be less relevant to your interests.\r\n</p><p><strong>Browser-Based Controls</strong></p><ul><li><strong>Cookie Controls</strong>. Relevant browser-based cookie controls are described in the\r\n <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">Cookies</a> section of this privacy statement.\r\n </li><li><strong>Tracking Protection</strong>. Internet Explorer (versions 9 and up) has a feature called Tracking Protection that will block third-party content, including cookies, from any site that is listed in a Tracking Protection List you add. By limiting calls to these sites, the browser will limit the information these third-party sites can collect about you.\r\n </li><li><strong>Browser Controls for "Do Not Track."</strong> Some browsers have incorporated "Do Not Track" (DNT) features that can send a signal to the websites you visit indicating you do not wish to be tracked. Because there is not yet a common understanding of how to interpret the DNT signal, Microsoft services do not currently respond to browser DNT signals. We continue to work with the online industry to define a common understanding of how to treat DNT signals. In the meantime, you can use the range of other tools we provide to control data collection and use, including the ability to opt out of receiving interest-based advertising from Microsoft as described above.\r\n </li></ul></span></div><div class="divModuleDescription"><span id="Header">Cookies &amp; Similar Technologies</span><span id="navigationHeader">Cookies &amp; Similar Technologies</span><span id="moduleName">maincookiessimilartechnologiesmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Microsoft uses cookies (small text files placed on your device) and similar technologies to provide our websites and online services and help collect data. Cookies allow us, among other things, to store your preferences and settings; enable you to sign-in; provide interest-based advertising; combat fraud; and analyze how our websites and online services are performing. Microsoft apps use other identifiers, such as the advertising ID in Windows, for similar purposes. \r\n</p><p>We also use web beacons to help deliver cookies and gather usage and performance data. Our websites may include web beacons and cookies from third-party service providers. \t\r\n</p><p>You have a variety of tools to control cookies, web beacons and similar technologies, including browser controls to block and delete cookies and controls from some third-party analytics service providers to opt out of data collection through web beacons. Your browser and other choices may impact your experiences with our products.\r\n</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription" loc="true"><p>\r\n Microsoft uses cookies (small text files placed on your device) and similar technologies to provide our websites and online services and help collect data. The text in a cookie often consists of a string of numbers and letters that uniquely identifies your computer, but it can contain other information as well. Microsoft apps use other identifiers, such as the <a class="mscom-link" href="#mainadvertisingidmodule">advertising ID</a> in Windows, for similar purposes, and many of our websites and applications also contain web beacons or other similar technologies, as described below.\r\n</p><p><strong>Our Use of Cookies and Similar Technologies</strong></p><p>Microsoft uses cookies and similar technologies for several purposes, depending on the product, including:</p><ul style="list-style-type: disc;"><li><strong>Storing your Preferences and Settings</strong>. Settings that enable our products to operate correctly or that maintain your preferences over time may be stored on your device. For example, if you enter your city or postal code to get local news or weather information on a Microsoft website, we may store that data in a cookie so that you will see the relevant local information when you return to the site. If you opt out of interest-based advertising, we store your opt-out preference in a cookie on your device.</li><li><strong>Sign-in and Authentication</strong>. When you sign into a website using your personal <a class="mscom-link" href="#mainmicrosoftaccountmodule">Microsoft account</a>, we store a unique ID number, and the time you signed in, in an encrypted cookie on your device. This cookie allows you to move from page to page within the site without having to sign in again on each page. </li><li><strong>Interest-Based Advertising</strong>. Microsoft uses cookies to collect data about your online activity and identify your interests so that we can provide advertising that is most relevant to you. You can opt out of receiving interest-based advertising from Microsoft as described in the\xa0<a class="mscom-link" href="#mainhowtoaccesscontrolyourdatamodule">Access and Control</a>\xa0section of this privacy statement. </li><li><strong>Analytics</strong>. In order to provide our products, we use cookies and other identifiers to gather usage and performance data. For example, we use cookies to count the number of unique visitors to a web page or service and to develop other statistics about the operations of our products. </li></ul><p>\r\n Some of the cookies we commonly use are listed in the following chart. This list is not exhaustive, but it is intended to illustrate the main reasons we typically set cookies. If you visit one of our websites, the site may set some or all of the following cookies:\r\n</p><table border="1" cellpadding="5" cellspacing="5"><tbody><tr><td><strong>Cookie name</strong><strong></strong></td><td><strong>Description</strong></td></tr><tr><td><p>MUID</p></td><td><p>Identifies unique web browsers visiting Microsoft sites. It is used for advertising, site analytics and other operational purposes.</p></td></tr><tr><td><p>ANON</p></td><td><p>Contains the ANID, a unique identifier derived from your Microsoft account, which is used for advertising, personalization, and operational purposes. It is also used to preserve your choice to opt out of interest-based advertising from Microsoft, if you have chosen to associate the opt-out with your Microsoft account.</p></td></tr><tr><td><p>CC</p></td><td><p>Contains a country code as determined from your IP address.</p></td></tr><tr><td><p>RPSTAuth, MSNRPSAuth, KievRPSAuth</p></td><td><p>Helps to authenticate you when you sign in with your Microsoft account.</p></td></tr><tr><td><p>NAP</p></td><td><p>Contains an encrypted version of your country, postal code, age, gender, language and occupation, if known, based on your Microsoft account profile.</p></td></tr><tr><td><p>MH</p></td><td><p>Appears on co-branded sites where Microsoft is partnering with an advertiser. This cookie identifies the advertiser so the right ad is selected.</p></td></tr><tr><td><p>TOptOut</p></td><td><p>Records your decision not to receive interest-based advertising delivered by Microsoft.</p></td></tr></tbody></table><p>\r\n In addition to the cookies Microsoft sets when you visit our websites, third parties may also set cookies when you visit Microsoft sites. In some cases, that is because we have hired the third party to provide services on our behalf, such as site analytics. In other cases, it is because our web pages contain content or ads from third parties, such as videos, news content or ads delivered by other ad networks. Because your browser connects to those third parties\' web servers to retrieve that content, those third parties are able to set or read their own cookies on your device and may collect information about your online activities across websites or online services.\r\n</p><p><strong>How to Control Cookies</strong></p><p>\r\n Most web browsers automatically accept cookies but provide controls that allow you to block or delete them. For example, in Microsoft Edge, you can block or delete cookies by clicking <strong>Settings\xa0&gt; Privacy\xa0&gt; Cookies.</strong> Instructions for blocking or deleting cookies in other browsers may be available in each browser\'s privacy or help documentation.\r\n</p><p>\r\n Certain features of Microsoft products depend on cookies. Please be aware that if you choose to block cookies, you may not be able to sign in or use those features, and preferences that are dependent on cookies may be lost. If you choose to delete cookies, settings and preferences controlled by those cookies, including advertising preferences, will be deleted and may need to be recreated.\r\n</p><p>\r\n Additional privacy controls that can impact cookies, including the Tracking Protection feature of Microsoft browsers, are described in the\r\n <a class="mscom-link" href="#mainhowtoaccesscontrolyourdatamodule">Access and Control</a> section of this privacy statement.\r\n</p><p><strong>Our Use of Web Beacons and Analytics Services</strong></p><p>Microsoft web pages may contain electronic images known as web beacons (also called single-pixel gifs) that we use to help deliver cookies on our websites, count users who have visited those websites and deliver co-branded products. We also include web beacons in our promotional email messages or newsletters to determine whether you open and act on them. </p><p>In addition to placing web beacons on our own websites, we sometimes work with other companies to place our web beacons on their websites or in their advertisements. This helps us develop statistics on how often clicking on an advertisement on a Microsoft website results in a purchase or other action on the advertiser\'s website. </p><p>\r\n Finally, Microsoft products often contain web beacons or similar technologies from third-party analytics providers, which help us compile aggregated statistics about the effectiveness of our promotional campaigns or other operations. These technologies enable the analytics providers to set or read their own cookies or other identifiers on your device, through which they can collect information about your online activities across applications, websites or other products. However, we prohibit these analytics providers from using web beacons on our sites to collect or access information that directly identifies you (such as your name or email address). You can opt out of data collection or use by some of these analytics providers by clicking the following links:\r\n</p><ul><li>\r\n Flurry Analytics:\r\n <a target="_blank" class="mscom-link" href="https://dev.flurry.com/secure/optOut.do">dev.flurry.com/secure/optOut.do</a></li><li>\r\n Google Analytics:\r\n <a target="_blank" class="mscom-link" href="http://tools.google.com/dlpage/gaoptout">tools.google.com/dlpage/gaoptout</a> (requires you to install a browser add-on)\r\n </li><li>\r\n Kissmetrics:\r\n <a target="_blank" class="mscom-link" href="https://kissmetrics.com/user-privacy">kissmetrics.com/user-privacy</a></li><li>\r\n Mixpanel:\r\n <a target="_blank" class="mscom-link" href="https://mixpanel.com/optout">mixpanel.com/optout</a></li><li>\r\n Nielsen:\r\n <a target="_blank" class="mscom-link" href="http://www.nielsen-online.com/corp.jsp?section=leg_prs&amp;nav=1#Optoutchoices">www.nielsen-online.com/corp.jsp?section=leg_prs&amp;nav=1#Optoutchoices</a></li><li>\r\n Omniture (Adobe):\r\n <a target="_blank" class="mscom-link" href="http://www.d1.sc.omtrdc.net/optout.html">www.d1.sc.omtrdc.net/optout.html</a></li><li>\r\n Visible Measures:\r\n <a target="_blank" class="mscom-link" href="http://www.visiblemeasures.com/viewer-settings-opt-out">www.visiblemeasures.com/viewer-settings-opt-out</a></li><li>\r\n WebTrends:\r\n <a target="_blank" class="mscom-link" href="https://ondemand.webtrends.com/support/optout.asp">ondemand.webtrends.com/support/optout.asp</a></li></ul><strong>Other Similar Technologies</strong><p>\r\n In addition to standard cookies and web beacons, our products can also use other similar technologies to store and read data files on your computer. This is typically done to maintain your preferences or to improve speed and performance by storing certain files locally. But, like standard cookies, these technologies can also be used to store a unique identifier for your computer, which can then be used to track behavior. These technologies include Local Shared Objects (or "Flash cookies") and Silverlight Application Storage.\r\n</p><p><strong>Local Shared Objects or "Flash cookies."</strong> Web sites that use Adobe Flash technologies can use Local Shared Objects or "Flash cookies" to store data on your computer. To manage or block Flash cookies, go to\r\n <a target="_blank" class="mscom-link" href="http://www.macromedia.com/support/documentation/en/flashp layer/help/settings_manager.html">www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager.html</a>.\r\n</p><p><strong>Silverlight Application Storage.</strong> Web sites or applications that use Microsoft Silverlight technology also have the ability to store data by using Silverlight Application Storage. To learn how to manage or block such storage, see the\r\n <a class="mscom-link" href="#mainsilverlightmodule">Silverlight</a> section of this statement.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Microsoft account</span><span id="navigationHeader">Microsoft account</span><span id="moduleName">mainmicrosoftaccountmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>With a Microsoft account, you can sign into Microsoft products, as well as those of select Microsoft Partners. Signing into your account can enable improved personalization, provide seamless and consistent experiences across products and devices, and help you access and use cloud data storage and other enhanced features and settings.</p><p>When you sign into your account to access a product, we create a record of that sign in. If you sign into a third-party service with your Microsoft account, you will be asked to consent to share the account data required by that service.</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>With a Microsoft account, you can sign into Microsoft products, as well as those of select Microsoft partners. When you create your own Microsoft account, we refer to that account as a personal Microsoft account. When you sign into products that use Microsoft Azure Active Directory (AAD) with an email address from your employer or school, we refer to that account as a work or school account.</p><p><strong>Creating and using your personal Microsoft account</strong>. When you create a personal Microsoft account, you will be asked for certain personal data and we will assign a unique ID number to identify your account and associated information. While some products, such as those involving payment, require a real name, you can sign into and use some Microsoft products without providing your real name. Some data you provide, such as your display name, email address and phone number, can be used to help others find and connect with you within Microsoft products. For example, people who know your display name, email address or phone number can use it to search for you on Skype and send you an invite to connect with them. Note that if you use a work or school email address to create a personal Microsoft account, and your employer or school that issued that address begins managing that account with Azure Active Directory (AAD), you will need to update the email address associated with your personal Microsoft account in order to continue accessing Microsoft products that do not use AAD (such as Xbox Live).\r\n</p><p><strong>Signing in</strong>. When you sign into your Microsoft account, we create a record of your sign-in, which includes the date and time, information about the product you signed into, your sign-in name, the unique number assigned to your account, a unique identifier assigned to your device, your IP address, and your operating system and browser version.</p><p><strong>Signing into Microsoft</strong>. Signing into your account enables improved personalization, provides seamless and consistent experiences across products and devices, and allows you to access and use cloud data storage and other enhanced features and settings. When you sign into your account, you will stay signed in until you sign out. If you add your Microsoft account to a Windows device (version 8 or higher), Windows will automatically sign you into products that use Microsoft account that you access on that device. When you are signed in, some products will display your name or username and your profile photo (if you have added one to your profile) as part of your use of Microsoft products, including in your communications, social interactions and public posts.</p><p><strong>Signing into third-party products</strong>. If you sign into a third-party product with your Microsoft account, you will be asked to consent to share the account data required by that product. The third party will also receive the version number assigned to your account (a new version number is assigned each time you change your sign-in data); and whether your account has been deactivated. The third party can use or share your data according to its own practices and policies. If you have consented to share your profile data, the third party may display your name or username and your profile photo (if you have added one to your profile) when you are signed in to that third-party product. <strong>You should carefully review the privacy statement for each product you sign into to determine how it will use the data it collects.</strong></p><p><strong>Personal Microsoft accounts received from third parties</strong>. If you received your personal Microsoft account from a third party, like an Internet service provider, that third party may have rights over your account, including the ability to access or delete your Microsoft account. <strong>You should carefully review any additional terms the third party provided you to understand what it can do with your account.</strong></p><p><strong>Connecting your personal Microsoft account to your social network accounts</strong>. You may connect your personal Microsoft account to your accounts on social networks such as Facebook, Twitter or LinkedIn in order to access data from those social networks from within Microsoft products. If you choose to do so, we will store data about your social network accounts on our servers so that we can display updated data from your social network account. You can disconnect a social network account from your personal Microsoft account at any time at <a target="_blank" class="mscom-link" href="https://profile.live.com/services">profile.live.com/services</a>.\r\n</p><p><strong>Using work or school accounts</strong>. If your employer or school uses Azure Active Directory (AAD) to issue and manage the account it provides you, you can use your work or school account to sign into Microsoft products that use AAD (such as Office 365 or Skype for Business). If required by your organization, you will also be asked to provide a phone number or an alternative email address for additional security verification. If you sign into Microsoft products with a work or school account, the owner of the domain associated with your email address may control and administer your account, and access and process your data, including the contents of your communications and files. Your use of the products may be subject to your organization\'s policies, if any. Microsoft is not responsible for the privacy or security practices of these organizations, which may differ from those of Microsoft. If your organization is administering your use of Microsoft products, please direct your privacy inquiries to your administrator.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Other Important Privacy Information</span><span id="navigationHeader">Other Important Privacy Information</span><span id="moduleName">mainotherimportantprivacyinformationmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Below you will find additional privacy information you may find important. You can also find more information on Microsoft\'s commitment to protecting your privacy at <a target="_blank" class="mscom-link" href="https://privacy.microsoft.com">privacy.microsoft.com</a>.\t\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Security of Personal Data</span><span id="navigationHeader">Security of Personal Data</span><span id="moduleName">mainsecurityofpersonaldatamodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Microsoft is committed to protecting the security of your personal data. We use a variety of security technologies and procedures to help protect your personal data from unauthorized access, use or disclosure. For example, we store the personal data you provide on computer systems that have limited access and are in controlled facilities. When we transmit highly confidential data (such as a credit card number or password) over the Internet, we protect it through the use of encryption.\t\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Where We Store and Process Personal Data</span><span id="navigationHeader">Where We Store and Process Personal Data</span><span id="moduleName">mainwherewestoreandprocessdatamodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Personal data collected by Microsoft may be stored and processed in your region, in the United States or in any other country where Microsoft or its affiliates, subsidiaries or service providers maintain facilities. We take steps to ensure that the data we collect under this privacy statement is processed according to the provisions of this statement and the requirements of applicable law wherever the data is located.</p><p>\r\n When we transfer personal data from the European Economic Area to other countries, we use a variety of legal mechanisms, including contracts, to help ensure your rights and protections travel with your data. </p><p>As described in our Privacy Shield certification, we also participate in the EU-U.S. Privacy Shield framework. Microsoft adheres to the principles of the Privacy Shield with respect to personal data transferred from the European Economic Area in reliance on the Privacy Shield. If third-party agents process personal data on our behalf in a manner inconsistent with the Privacy Shield Principles, we remain liable unless we prove we are not responsible for the event giving rise to the damage. The U.S. Department of Commerce lists the participants in the Privacy Shield at\r\n <a target="_blank" class="mscom-link" href="https://www.privacyshield.gov/list">https://www.privacyshield.gov/list</a>.</p><p>If you have a question or complaint related to Microsoft\u2019s participation in the Privacy Shield, we encourage you to contact us via our\r\n <a target="_self" class="mscom-link" href="https://go.microsoft.com/fwlink/?LinkId=321116">web form</a>. For any complaints related to the Privacy Shield that cannot be resolved with Microsoft directly, we have chosen to cooperate with a panel established by the European Data Protection Authorities (DPAs) for resolving disputes. Please contact us to be directed to the relevant DPA contacts. As further explained in the Privacy Shield Principles, binding arbitration is available to address residual complaints not resolved by other means. Microsoft is subject to the investigatory and enforcement powers of the U.S. Federal Trade Commission (FTC).</p><p>Microsoft also adheres to both the Swiss-U.S. Safe Harbor privacy principles and the EU-U.S. Privacy Shield privacy principles regarding the collection, use, and retention of personal data from Switzerland. Microsoft does not make any representations related to the effect of that adherence under Swiss law.</p></span></div><div class="divModuleDescription"><span id="Header">Our Retention of Personal Data</span><span id="navigationHeader">Our Retention of Personal Data</span><span id="moduleName">mainOurretentionofpersonaldatamodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Microsoft retains personal data for as long as necessary to provide the products and fulfill the transactions you have requested, or for other essential purposes such as complying with our legal obligations, resolving disputes, and enforcing our agreements. For example:</p><ul><li>For Bing search queries, we de-identify stored queries by removing the entirety of the IP address after 6 months, and cookie IDs and other cross-session identifiers after 18 months. </li><li>In Outlook.com, when your Deleted Items folder is emptied, those emptied items remain in our system for up to 30 days before final deletion. </li><li>\r\n If you remove a credit card from your account, Microsoft will retain transaction records containing your credit card number for as long as reasonably necessary to complete any existing transactions, to comply with Microsoft\'s legal and reporting requirements, and for the detection and prevention of fraud.\r\n </li></ul></span></div><div class="divModuleDescription"><span id="Header">Collection of Data From Children</span><span id="navigationHeader">Collection of Data From Children</span><span id="moduleName">maincollectionofdatafromchildrenmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>When a Microsoft product collects age it will either block users under 13 or will ask them to provide consent from a parent or guardian before they can use it. We will not knowingly ask children under 13 to provide more data than is necessary to provide the product. </p><p>Once parental consent is granted, the child\'s account is treated much like any other account. The child may have access to communication services like email, instant messaging and online message boards and may be able to communicate freely with other users of all ages.</p><p>\r\n Parents can change or revoke the consent choices previously made, and review, edit or request the deletion of their children\'s personal data. For example, parents can access their personal\r\n <a target="_blank" class="mscom-link" href="https://go.microsoft.com/FWLink/p/?LinkID=238657">Microsoft account</a> and click on "Permissions." For users of Minecraft and other Mojang games, parents can contact us at\r\n <a target="_blank" class="mscom-link" href="https://account.mojang.com/terms#contact">account.mojang.com/terms#contact</a>.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Preview Releases</span><span id="navigationHeader">Preview Releases</span><span id="moduleName">mainpreviewreleasesmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Microsoft offers preview, insider, beta or other pre-release products and features ("previews") to enable you to evaluate them while providing feedback, including performance and usage data, to Microsoft. As a result, previews can automatically collect additional data, provide fewer controls, and otherwise employ different privacy and security measures than those typically present in our products. If you participate in previews, we may contact you about your feedback or your interest in continuing to use the product after general release.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Changes to This Privacy Statement</span><span id="navigationHeader">Changes to This Privacy Statement</span><span id="moduleName">mainchangestothisprivacystatementmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\n We will update this privacy statement when necessary to reflect customer feedback and changes in our products. When we post changes to this statement, we will revise the "last updated" date at the top of the statement and describe the changes in the <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/p/?LinkId=780766">Change History</a> page. If there are material changes to the statement or in how Microsoft will use your personal data, we will notify you either by prominently posting a notice of such changes before they take effect or by directly sending you a notification. We encourage you to periodically review this privacy statement to learn how Microsoft is protecting your information. \r\n</p></span></div><div class="divModuleDescription"><span id="Head er">How to Contact Us</span><span id="navigationHeader">How to Contact Us</span><span id="moduleName">mainhowtocontactusmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\n If you have a technical or support question, please visit <a target="_blank" class="mscom-link" href="https://support.microsoft.com/">support.microsoft.com</a> to learn more about Microsoft Support offerings. If you have a\xa0personal Microsoft account\xa0password question, please visit <a target="_blank" class="mscom-link" href="https://go.microsoft.com/FWLink/p/?LinkID=320207">Microsoft account support</a>.\r\n</p><p>\r\n If you have a privacy concern or a question for the Chief Privacy Officer of Microsoft, please contact us by using our <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/?LinkId=321116">Web form</a>. We will respond to questions or concerns within 30 days. \r\n</p><p>\r\n Unless otherwise stated, Microsoft Corporation is a data controller for personal data we collect through the products subject to this statement. Our address is Microsoft Privacy, Microsoft Corporation, One Microsoft Way, Redmond, Washington 98052, USA. Telephone: (+1) 425-882-8080. \r\n</p><p>Microsoft Ireland Operations Limited is our data protection representative for the European Economic Area and Switzerland. The data protection officer of Microsoft Ireland Operations Limited can be reached at the following address: Microsoft Ireland Operations, Ltd., Attn: Data Protection, Carmenhall Road, Sandyford, Dublin 18, Ireland.</p><p>Skype Communications S.\xe0.r.l. 23-29 Rives de Clausen L-2165 Luxembourg, Luxembourg is a data controller for Skype. To contact us in relation to Skype software or products, please submit a support request to the Skype <a target="_blank" class="mscom-link" href="https://support.skype.com/en/">customer support team</a>.</p><p>\r\n To find the Microsoft subsidiary in your country or region, see <a target="_blank" class="mscom-link" href="https://www.microsoft.com/worldwide/">www.microsoft.com/worldwide/</a>.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Bing</span><span id="navigationHeader">Bing</span><span id="moduleName">mainbingmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Bing services include search and mapping services, as well as the Bing Toolbar and Bing Desktop apps. Bing services are also included within other Microsoft services, such as\xa0<a class="mscom-link" title="MSN" href="#mainmainmodule">MSN</a> Apps and <a class="mscom-link" title="Cortana" href="#maincortanamodule">Cortana</a>, and <a class="mscom-link" title="Windows" href="#mainwindowsmodule">Windows</a> (which we refer to as Bing-powered experiences). When you use Bing services, we collect your search queries, location and other information about your interaction with our services.\r\n</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>\r\n Bing services include search and mapping services, as well as the Bing Toolbar and Bing Desktop apps. Bing services are also included within other Microsoft services, such as\r\n <a class="mscom-link" title="MSN" href="#mainmainmodule">MSN</a> Apps and\r\n <a class="mscom-link" title="Cortana" href="#maincortanamodule">Cortana</a>, and certain features in\r\n <a class="mscom-link" title="Windows" href="#mainwindowsmodule">Windows</a> (which we refer to as Bing-powered experiences).\r\n</p><p>\r\n When you conduct a search, or use a feature of a Bing-powered experience that involves conducting a search or entering a command on your behalf, Microsoft will collect the search or\xa0command\xa0terms you provide, along with your IP address, location, the unique identifiers contained in our\r\n <a class="mscom-link" title="rewards.xbox.com" href="#maincookiessimilartechnologiesmodule">cookies</a>, the time and date of your search, and your browser configuration. If you use Bing voice-enabled services, additionally your voice input and performance data associated with the speech functionality will be sent to Microsoft. When you use Bing-powered experiences, such as Ask Cortana or Bing Lookup, to search a particular word or phrase within a web page or document, that word or phrase is sent to Bing along with some surrounding content in order to provide contextually relevant search results.\r\n</p><p><strong>Search Suggestions. </strong>For the\xa0Search Suggestions\xa0feature, the characters that you type into a Bing-powered experience to conduct a search will be sent to Microsoft. This allows us to provide you with suggestions as you type your searches. To turn this feature on or off, go to\r\n <a target="_blank" class="mscom-link" title="rewards.xbox.com" href="https://www.bing.com/account/general">Bing settings</a>.\r\n</p><p><strong>Bing Experience Improvement Program for Bing Desktop and Bing Toolbar. </strong>If you are using Bing Desktop or Bing Toolbar and choose to participate in the Bing Experience Improvement Program, we also collect additional data about how you use these specific Bing apps, such as the addresses of the websites you visit, to help improve search ranking and relevance. To help protect your privacy, we do not use the data collected through the Bing Experience Improvement Program to identify or contact you, or target advertising to you. You can turn off the Bing Experience Improvement Program at any time in the Bing Desktop or Bing Toolbar settings. Finally, we delete the information collected through the Bing Experience Improvement Program after 18 months. </p><p><strong>Retention and de-identification.</strong> We de-identify stored search queries by removing the entirety of the IP address after 6 months, and cookie IDs and other cross-session identifiers after 18 months.</p><p><strong>Personalization through Microsoft account. </strong>Some Bing services provide you with an enhanced experience when you sign in with your personal\r\n <a class="mscom-link" title="rewards.xbox.com" href="#mainmicrosoftaccountmodule">Microsoft account</a>, for example, syncing your search history across devices. You can use these personalization features to customize your interests, favorites, and settings, and to connect your account with third-party services. Visit the\r\n <a target="_blank" class="mscom-link" title="rewards.xbox.com" href="https://www.bing.com/account/general">Bing Settings</a> page to manage your personalization settings. </p><p><strong>Managing Search History.</strong> Bing\'s Search History service provides an easy way to revisit the search terms you\'ve entered and results you\'ve clicked when using Bing search through your browser. You may clear your search history in\r\n <a target="_blank" class="mscom-link" title="rewards.xbox.com" href="https://www.bing.com/profile/history">Bing Settings</a>. Clearing your history removes it from the Search History service and prevents that history from being displayed on the site, but does not delete information from our search logs, which are retained and de-identified as described above.</p><p><strong>Non-Microsoft services that use Bing.</strong> You may access Bing-powered experiences when using other non-Microsoft services, such as those from Yahoo!. In order to provide these services, Bing receives data from these and other partners that may include date, time, IP address, a unique identifier and other search-related data. This data will be sent to Microsoft in order to provide the search service. Microsoft will use this data as described in this statement or as further limited by our contractual obligations with our partners. You should refer to the privacy policies of the non-Microsoft services for any questions about how they collect and use data.\r\n</p><p><strong>Search query passed in referral URL.</strong> When you click on a search result or advertisement from a Bing search results page and go to the destination website, the destination website will receive the standard data your browser sends to every web site you visit - such as your IP address, browser type and language, and the URL of the site you came from (in this case, the Bing search results page). Because the URL of the Bing search results page contains the text of the search query you entered (which could include names, addresses, or other identifying information), the destination website will be able to determine the search term you entered.\r\n</p><p>\r\n If your browser is enabled to allow pages to pre-load in the background for faster performance,\xa0when your browser loads a page in the background, it will have the same effect as if you visited that page, including sending the Bing search results page URL (containing your search query) and downloading any\r\n <a class="mscom-link" title="rewards.xbox.com" href="#maincookiessimilartechnologiesmodule">cookies</a> that page sets.\r\n</p><p><strong>Sharing search data for research and development purposes.</strong>\xa0We share some de-identified search query data with selected third parties for research and development purposes. Before we do so, we remove all unique identifiers such as IP addresses and cookie IDs from the data. We also run the data through a process designed to remove certain sensitive data that users may have included in the search terms themselves (such as social security numbers or credit card numbers). Additionally, we require these third parties to keep the data secure and to not use the data for other purposes.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Cortana</span><span id="navigationHeader">Cortana</span><span id="moduleName">maincortanamodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Cortana is your personal assistant. Cortana works best when you sign in and let her use data from your device, your personal Microsoft account, other Microsoft services, and third-party services you choose to connect. If you choose not to sign into Cortana, you can still chat with Cortana and use Cortana to help you search the web and your device. But if you don\u2019t sign in, your experiences will be more limited and they will not be personalized.</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>\r\n Cortana is your personal assistant. Cortana works best when you sign in and let her use data from your device, your personal Microsoft account, other Microsoft services, and third-party services you choose to connect. If you choose not to sign into Cortana, you can still chat with Cortana and use Cortana to help you search the web and your device. But if you don\u2019t sign in, your experiences will be more limited and they will not be personalized.\r\n</p><p><strong>Signed out</strong>. When you are not signed in, Cortana will collect data about how you chat with Cortana and use Cortana to search, using either your voice, inking, or typing. This data includes the following:</p><ul><li><strong>Speech, inking, and typing</strong>. To help Cortana better understand the way you speak and your voice commands, speech data is sent to Microsoft to build speech models and improve speech recognition and user intent understanding. If you choose to sign in, the speech models will become more personalized.</li><li><strong>Search history</strong>. Your Bing search queries - even if Cortana does the searching for you - are treated like any other Bing search queries and are used as described in the <a class="mscom-link" href="#mainbingmodule">Bing</a> section.</li><li><strong>Device Data</strong>. Cortana can access data about your device and how you use it. For instance, it can determine if Bluetooth is on, whether your lock screen in on, your alarm settings, and which apps you install and use.</li></ul><p><strong>Signed in</strong>. If you sign in, you enable Cortana to perform additional tasks and to provide personalized experiences and relevant suggestions; and you give Cortana permission to collect or access the following additional types of data:</p><ul><li><strong>Microsoft account</strong>. Cortana can access the demographic data (such as your age, postal code and gender) you provided when you created your personal <a class="mscom-link" href="#mainmicrosoftaccountmodule">Microsoft account</a>.</li><li><strong>Other Microsoft product usage</strong>. Cortana uses data collected through other Microsoft services to provide personalized suggestions. For example, Cortana uses data collected by the MSN Sports app so it can automatically display information about the teams you follow. It also learns your favorite places from Microsoft\'s Maps app, your favorite songs and artists from the music you play in <a class="mscom-link" href="#maingroovemusicmoviestvmodule">Groove Music</a>, and what you view and purchase in the <a class="mscom-link" href="#mainwindowsstoremodule">Windows Store</a> so it can offer better suggestions. Your interests in Cortana\'s Notebook can be used by other Microsoft services, such as Bing or MSN, to customize your interests, preferences, and favorites in those experiences as well.</li></ul><p><strong>Location</strong>. You can choose whether Cortana accesses your location information in order to give you the most relevant notices and results and to make suggestions that help save you time, such as traffic information and location-based reminders. If you grant permission, Cortana will regularly collect and use your current location, location history, and other location signals (such as locations tagged on photos you upload to OneDrive).</p><p><strong>Contacts, email, calendar &amp; communications</strong>. You can choose to let Cortana access your email and other communications, your calendar, and your contacts in order to enable additional features and personalization. If you give permission, Cortana will access additional data including:</p><ul><li><strong>Text messages and email</strong>. Cortana accesses your messages to do a variety of things such as: allowing you to add events to your calendar, apprising you of important messages, and keeping you up to date on events or other things that are important to you, like package or flight tracking. Cortana also uses your messages to help you with planning around your events and offers other helpful suggestions and recommendations.</li><li><strong>Communications History</strong>. Cortana learns who is most important to you from your call, text message, and email history. This data is used to keep track of people most relevant to you and your preferred methods of communication, flag important messages for you (such as missed calls), and improve the performance of Cortana features such as speech recognition.</li><li><strong>Calendar appointments</strong>. Cortana access your calendars in order to provide reminders and information relevant to your appointments.</li></ul><p><strong>Browsing history</strong>. If you allow Cortana to use your Microsoft Edge browsing history (see the <a class="mscom-link" href="#mainwebbrowsersmodule">Microsoft Edge</a> description in the Windows section of this statement), Cortana can help you pick up where you left of on websites, and provide suggestions based on the sites you visit in Microsoft Edge. Cortana won\'t collect information about sites you visit in InPrivate tabs.</p><p><strong>Other Connected Services</strong>. You can also give Cortana access to other data collected by other Microsoft and third party services by connecting those services with Cortana.</p><ul><li><strong>Connected Microsoft services</strong>. If you choose to connect Cortana to your <a class="mscom-link" href="#mainxboxmodule">Xbox Live</a> account, Cortana can access your Xbox Live data in order to learn about your gaming activity and provide you with relevant content and suggestions, notify you when your friends are available to play, and help you schedule game sessions. If you choose to connect Cortana to your <a class="mscom-link" href="#mainenterpriseservicesmodule">Office 365</a> work or school account, Cortana can access data stored in Office 365 to help you stay up to date and get insights about your meetings, documents, and relationships.</li><li><strong>Connected third-party services</strong>. Cortana allows you to connect to third-party services to enable her to do more and provide additional personalized experiences based upon data from the third-party service, such as LinkedIn or Uber. For example, choosing to sign into LinkedIn within Cortana allows Microsoft to access your LinkedIn data so that Cortana can give you more personalized information and recommendations. <strong><em>When Cortana is connected to a third-party service, it can also send data to that service to enable the connected service</em></strong>. For instance, Cortana will send to LinkedIn the name, email address, job title, and company name of people you are meeting with, in order for Cortana to retrieve relevant information about those contacts. Similarly, Cortana will send your current location and destination to Uber when you ask Cortana to request a ride. You can manage Cortana\'s connections to third-party services in the Cortana Notebook.</li></ul><p>Remember that you can always sign out of Cortana, and when you do, Cortana will still be there to help, but your experiences will not be personalized. You can manage what data Cortana uses, and what it knows about you in Cortana Settings, Permissions, and Notebook. More about the individual features, and how to manage them can be found at <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/?linkid=522360">go.microsoft.com/fwlink/?linkid=522360</a>.</p></span></div><div class="divModuleDescription"><span id="Header">Groove Music/Movies &amp; TV</span><span id="navigationHeader">Groove Music/Movies &amp; TV</span><span id="moduleName">maingroovemusicmoviestvmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\n Groove Music lets you easily play your music collection, make playlists, buy music and stream custom radio stations. Microsoft Movies &amp; TV allows you to play your video collection, and rent or buy movies and TV episodes. Microsoft will use data about the content you play in order to help you discover content that may interest you.\r\n </p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>\r\n Groove Music lets you easily play your music collection, make playlists, buy music and stream custom radio stations. Microsoft Movies &amp; TV allows you to play your video collection, and rent or buy movies and TV episodes. These services were formerly offered as Xbox Music and Video.\r\n </p><p>\r\n To help you discover content that may interest you, Microsoft will collect data about what content you play, the length of play, and the rating you give it. If you enable Cortana on your device, Microsoft will collect and use data related to the music you play via Groove Music to provide personalized experiences and relevant suggestions.\r\n </p><p>\r\n To enrich your experience when playing content, Groove Music and Movies &amp; TV will display related information about the content you play and the content in your music and video libraries, such as the album title, cover art, song or video title, and other information, where available. To provide this information, Groove Music and Movies &amp; TV send an information request to Microsoft containing standard device data, such as your device IP address, device software version, your regional and language settings, and an identifier for the content.\r\n </p><p>\r\n If you use Groove Music or Movies &amp; TV to access content that has been protected with Microsoft Digital Rights Management (DRM), it may automatically request media usage rights from an online rights server and download and install DRM updates in order to let you play the content. See the DRM information in the <a class="mscom-link" href="#mainsilverlightmodule">Silverlight</a> section of this privacy statement for more information.\r\n </p></span></div><div class="divModuleDescription"><span id="Header">Microsoft Cognitive Services</span><span id="navigationHeader">Microsoft Cognitive Services</span><span id="moduleName">mainmicrosoftcognitiveservicesmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Microsoft Cognitive Services help developers build apps that can better comprehend data, such as by detecting faces and objects in images, understanding spoken words, or interpreting commands. We collect and use your data to provide the services, which includes improving and personalizing your experiences.</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>Microsoft Cognitive Services help developers build apps that can better comprehend data, such as by detecting faces and objects in images, understanding spoken words, or interpreting commands. We collect and use your data to provide the services, which includes improving and personalizing your experiences.</p><p>Cognitive Services collect and use many types of data, such as images, audio files, video files, or text, all of which are retained by Microsoft. Microsoft has implemented business and technical measures designed to help de-identify some data Cognitive Services retain. De-identification will not anonymize data completely; for example, a person in a photograph could still be recognized by someone who knows that person.</p><p>Microsoft and apps that use Cognitive Services may also collect and use your data. For example, Bing uses search queries collected through the Cognitive Services Bing Search APIs as described in the Bing section. Microsoft Translator uses data sent through the Cognitive Services Translator API as described in the Translator section.</p></span></div><div class="divModuleDescription"><span id="Header">Microsoft Health Services</span><span id="navigationHeader">Microsoft Health Services</span><span id="moduleName">mainmicrosofthealthservicesmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\n Microsoft Health services can help you understand and manage your health data. They include the Microsoft Band devices, Microsoft Health apps, HealthVault, and other related services. The Band helps you keep track of data like heart rate and steps taken. The Band can also use Cortana to take notes and receive notifications from your phone. The Microsoft Health app sends data to Microsoft\'s servers and allows you to manage and control the data. The app provides a channel for other apps on your phone to send notifications to the Band. HealthVault is a personal health platform that lets you gather, edit, add to, and store health data online. With HealthVault, you can also choose to share your health data with family, caregivers, and health care professionals.\r\n</p><p>\r\n Microsoft Health services collect and use your data to provide the services, which includes improving and personalizing your experiences. Health data you provide to Microsoft through Microsoft Health services is not combined with data from other Microsoft services, or used for other purposes without your explicit consent. For example, Microsoft does not use your health record data to market or advertise to you without your opt-in consent.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Microsoft Health and Microsoft Band</span><span id="navigationHeader">Microsoft Health and Microsoft Band</span><span id="moduleName">mainmicrosofthealthandbandmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\n Microsoft Health and Microsoft Band can help you understand and manage your health data. The data collected depends on the services and features you use, and includes the following: \r\n</p><ul><li><strong>Profile Data</strong>. When you create a profile, you will need to provide data, such as height, weight, and age that is used to calculate your activity results. Other profile data comes from your personal <a class="mscom-link" href="#mainmicrosoftaccountmodule">Microsoft account</a>.\r\n </li><li><strong>Activity and Fitness Data</strong>. Microsoft Band helps you keep track of your activity and fitness by collecting data like your heart rate, steps, calories burned, and sleep. Examples of types of activities you can choose to track are runs, workouts, and sleep.\r\n </li><li><strong>Usage Data</strong>. To provide you the best service, we collect and automatically upload statistics about the performance and your use of the Microsoft Health and Microsoft Band.\r\n </li><li><strong>Location</strong>. Microsoft Band has built-in Global Positioning System (GPS) capabilities, which let you map your activities like running or biking, without having to carry your phone with you. If you enable GPS for an activity, you can view the activity map in the Microsoft Health app. Some modes on the Band, such as Golf and Explorer, automatically turn on GPS, and turn it off when you end the mode.\xa0\r\n </li></ul><p>To learn more about the Band\'s sensors and the data they collect, go <a target="_blank" class="mscom-link" href="https://www.microsoft.com/microsoft-band/support/hardware/sensors">here</a>.</p><p><strong>Access and Control</strong>. You can view and manage your data in Microsoft Health. For example, in Microsoft Health, you can view and update your profile data, manage connected applications, and view past activities. You can delete specific activity details in the Microsoft Health app. When you delete a specific activity, the event is deleted from the Microsoft Health service; however, the basic sensor data captured by the devices remain in the Microsoft Health service. You can cancel your Microsoft Health account at any time by contacting Customer Support <a target="_blank" class="mscom-link" href="http://aka.ms/w6r45e">here</a>.\r\n</p><p><strong>Cortana</strong>. The Band allows you to take notes, perform queries, and set reminders with your voice, if <a class="mscom-link" href="#maincortanamodule">Cortana</a> is enabled on your phone. To learn more about how <a class="mscom-link" href="#maincortanamodule">Cortana</a> manages your data, see the Cortana section of this privacy statement.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">HealthVault</span><span id="navigationHeader">HealthVault</span><span id="moduleName">mainhealthvaultmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\n HealthVault is a personal health platform that lets you gather, edit, store, and share health data online. With HealthVault, you can control your own health records. You can also choose to share your health data with family, caregivers, health care professionals, mobile apps, health-related devices, and online tools. For more information about HealthVault, go to <a target="_blank" class="mscom-link" href="http://aka.ms/kr4ndl">here</a>.\r\n</p><p><strong>Signing into HealthVault</strong>. To sign into HealthVault, you can use <a class="mscom-link" href="#mainmicrosoftaccountmodule">Microsoft account</a> or a third-party authentication service. If you close your Microsoft account or lose your account credentials, you may not be able to access your data. You can use more than one credential with HealthVault to help ensure continued access. Before using a third-party authentication service with HealthVault, we recommend you review the security and privacy commitments offered by the issuer.\r\n</p><p><strong>HealthVault Account and Health Records</strong>. To create a new HealthVault account, you must provide personal data such as name, date of birth, e-mail address, postal code and country/region. Depending on which features you use, you may be asked for additional information. A HealthVault account allows you to manage one or more health records, such as the ones you create for yourself and your family members. You can add or remove data to a health record you manage at any time.\r\n</p><p>\r\n In the U.S., HealthVault assigns each health record an email address. When a message is received at that email address, the message and attachments are automatically added to the HealthVault record, and a notification email is sent to the custodians of that record. The email service in HealthVault uses "Direct," a protocol designed specifically to communicate with health care providers. For that reason, HealthVault email can only be sent and received with providers that use a system that uses the Direct protocol. Custodians can add or disable record email addresses. \r\n</p><p><strong>Sharing Health Data</strong>. A key value of HealthVault is the ability you have to share your health data with people and services that can help you meet your health-related goals. By default, you are the custodian of any records you create. Custodians have the highest level of access to a health record. As a custodian, you can share data in a health record with another person by sending an e-mail invitation through HealthVault. You can specify what type of access they have (including custodian access), how long they have access, and whether they can modify the data in the record. When you grant someone access, that person can grant the same level of access to someone else (for example, someone with view-only access can grant another user view-only access). <strong>Because inappropriate granting of access could allow someone to violate your privacy or even revoke your access to your own records, you should be cautious about granting access to your records.</strong></p><p>\r\n You can choose to share specific data (or all of the data) in a health record with other services. No service has access to your data through HealthVault unless an authorized user grants it access through HealthVault. HealthVault allows you to control access by accepting or denying requests. For each service granted access, you choose what health information in a specific health record to share and what actions each service may perform on the health information.\r\n</p><p>\r\n A service you authorize for a record will get the full name associated with your HealthVault account, the nickname of the authorized record(s), and your relationship to that record. The service will continue to have access through HealthVault until you revoke the permission. Microsoft can revoke a service\'s access to HealthVault if it does not meet its privacy commitments to Microsoft. However, except for restricting the access they have to your HealthVault data, we do not control or monitor those services, and their privacy practices will vary.\r\n</p><p><strong>Reports to U.S. Health Care Providers</strong>. In the United States, we enable participating health care providers to obtain reports about whether the information they send to a record is used. This feature supports the "meaningful use" objective of the HITECH Act, which provides incentives for health care providers to send their patients copies of their medical information electronically. Providers that participate can get reports that include a number the provider uses to identify the patient within its system, and whether the user took one of the "qualifying actions" in HealthVault (but no information about which action). "Qualifying action" currently includes activities such as viewing, downloading, or transmitting health information via email. You can turn off reporting for your records.\r\n</p><p><strong>Access and controls</strong>. You can review, edit or delete your HealthVault account data, or close your HealthVault account at any time. Only custodians can permanently delete an item. When you delete a h eath record, it is deleted from all users who had access to it.\r\n</p><p>\r\n When you close your HealthVault account, we delete all records for which you are the sole custodian. If you share custodian access for a record, you can decide whether to delete the record. Microsoft will wait a limited amount of time before permanently deleting your data in order to help avoid accidental or malicious removal of your health data.\r\n</p><p>\r\n HealthVault maintains a full history of each access, change or deletion by users and services, which includes the date, action and name of the person or service. Custodians of records can examine the history of those records.\r\n</p><p><strong>Email Communications</strong>. We will use the email address you provide when you create your HealthVault account to send you an email requesting that you validate your email address, to include in sharing invitations you send through HealthVault, and to send you service notifications, such as email notifications that information is available to add to your HealthVault records.\r\n</p><p>\r\n HealthVault periodically sends newsletters to help keep you informed of the latest improvements. HealthVault will also periodically send you an email summarizing recent account activity. Subject to your contact preferences, we also use your email addresses to send you promotional email. You can unsubscribe from these emails at any time. \r\n</p></span></div><div class="divModuleDescription"><span id="Header">Microsoft Translator</span><span id="navigationHeader">Microsoft Translator</span><span id="moduleName">mainMicrosoftTranslatormodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Microsoft Translator is a statistical machine translation system designed to automatically translate text and speech between numerous supported languages. Translator may be incorporated into other Microsoft products and services, such as Office, SharePoint, and Bing. Third parties may also incorporate Translator into their own services and offerings. For information on the privacy practices of third-parties\u2019 services and offerings, consult their privacy statements.</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>Microsoft Translator is a statistical machine translation system designed to automatically translate text and speech between numerous supported languages. Translator may be incorporated into other Microsoft products and services, such as Office, SharePoint, and Bing. Third parties may also incorporate Translator into their own services and offerings. For information on the privacy practices of third-parties\u2019 services and offerings, consult their privacy statements.</p><p>Microsoft Translator collects and uses the text, image, and speech data you submit, as well as information about how you are accessing the Translator service, such as operating system version, browser type and language. We use your data to provide the Translator service, which includes improving and personalizing your experiences. Microsoft has implemented business and technical measures designed to help de-identify the data Translator retains. For example, we randomly sample text to improve Translator and mask or delete strings of numbers and other personally identifiable information we detect in the sample.</p><p>If you subscribe to the Microsoft Translator API with a monthly volume of 250 million characters or more, you may request to have logging turned off for the text you submit to Microsoft Translator by submitting a request using the process detailed at <a class="mscom-link" href="https://www.microsoft.com/translator/notrace.aspx">www.microsoft.com/translator/notrace.aspx</a>.</p></span></div><div class="divModuleDescription"><span id="Header">MSN</span><span id="navigationHeader">MSN</span><span id="moduleName">mainmainmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>MSN services include websites and a suite of apps. We collect information about the installation of MSN Apps and the devices on which they are installed. We also collect data about how you interact with MSN services, such as usage frequency and content viewed.\r\n</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>\r\n MSN services include websites and a suite of apps, including MSN News, Weather, Sports, and Money, and previous versions of the apps branded as Bing (together, "MSN Apps"). The MSN Apps are available on various platforms, including Windows, iOS, and Android. MSN services are also included within other Microsoft services, including the Microsoft Edge browser.\xa0\r\n </p><p>\r\n When you install MSN Apps, we collect data that tells us if the app was installed properly, the installation date, the app version, and other data about your device such as the operating system and browser. This data is collected on a regular basis to help us determine the number of MSN App users and identify performance issues associated with different app versions, operating systems, and browsers.\r\n </p><p>\r\n We also collect data about how you interact with MSN services, such as usage frequency and content viewed. Some MSN\xa0services provide an enhanced experience when you sign in with your Microsoft account, including allowing you to customize your interests and favorites. You can manage personalization through MSN and Bing settings, as well as through settings in other Microsoft services that include\xa0MSN services. We also use the data we collect to provide you with advertisements that may be of interest to you. You can opt out of interest-based advertising through the advertising links within MSN services, or by visiting Microsoft\'s <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/?LinkID=286759">opt-out page</a>.\r\n </p><p>\r\n Previous versions of MSN Money allow you to access personal finance information from third-party financial institutions. MSN Money only displays this information and does not store it on our servers. Your log-in credentials used to access your financial information from third parties are encrypted on your device and are not sent to Microsoft. These financial institutions, as well as any other third-party services you access through MSN services, are subject to their own terms and privacy policies.\r\n </p></span></div><div class="divModuleDescription"><span id="Header">Office</span><span id="navigationHeader">Office</span><span id="moduleName">mainofficeservicesmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Office is a collection of productivity applications including Word, Excel, PowerPoint, and Outlook among others. For more details about Outlook, see the <a class="mscom-link" href="#mainoutlookmodule">Outlook</a> section of this privacy statement. Various Office applications enable you to use content and functionality from other Microsoft and third-party connected services such as Bing. For detailed information about how to manage your privacy options, please see <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/?LinkId=624445">go.microsoft.com/fwlink/?LinkId=624445</a>. If you work in an organization, your administrator can turn off connected services via Group Policy.</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>Office is a collection of productivity applications including Word, Excel, PowerPoint, and Outlook among others. For more details about Outlook, see the <a class="mscom-link" href="#mainoutlookmodule">Outlook</a> section of this privacy statement. Various Office applications enable you to use content and functionality from other Microsoft and third-party connected services such as Bing. For detailed information about how to manage your privacy options, please see <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/?LinkId=624445">go.microsoft.com/fwlink/?LinkId=624445</a>. If you work in an organization, your administrator can turn off connected services via Group Policy.</p><p><strong>Office Roaming Service</strong>. The Office Roaming Service helps keep your Office settings up-to-date across your devices running Office. When you sign into Office with your <a class="mscom-link" href="#mainmicrosoftaccountmodule">Microsoft account</a>, the Office Roaming Service is turned on and syncs some of your customized Office settings to Microsoft servers (such as a list of most recently used documents and the last location viewed within a document). When you sign into Office on another device with the same account, the Office Roaming Service downloads your settings from Microsoft servers and applies them to the additional device. The Office Roaming Service also applies some of your customized Office settings when you sign into Office.com. When you sign out of Office, the Office Roaming Service removes your Office settings from your device. Any changes you made to your customized Office settings are sent to Microsoft servers.</p><p><strong>Microsoft Updates</strong>. Office uses the <a class="mscom-link" href="#mainupdateservicemodule">Microsoft Update</a> service to provide you with security and other important updates. See the Update Services section of this privacy statement for more information.</p><p><strong>Online Help, templates, fonts, and other content</strong>. Office uses other Microsoft or third-party services to give you the latest online content when you are connected to the Internet such as Help articles, templates, and fonts. For example, when you use the Help feature in Office applications, Office sends your search query to Office.com to provide you with online Help articles. These features are turned on by default, but you can turn them off using privacy settings. You can access privacy settings in Office 2013 by clicking <strong>File &gt; Options &gt; Trust Center &gt; Trust Center Settings &gt; Privacy Options</strong>.</p><p><strong>Click-to-Run Update Service</strong>. The Click-to-Run Update Service allows you to install certain Microsoft Office products over the Internet so you can start using them before they are completely downloaded. By default, the Click-to-Run Update Service also automatically detects online updates to Click-to-Run-enabled products on your device and downloads and installs them automatically. The service is turned on by default, but you can turn it off by using privacy settings.\r\n</p><p><strong>Search services</strong>. Office-supported search services such as Insights allow you to request information from Microsoft or third-party services from within an Office application. For example, in Word, you can highlight a word or phrase and retrieve relevant information from Bing search. When you search on a particular word or phrase, Office sends to the service the encrypted text you requested (and when using Insights, in order to provide you with contextually relevant search results, Office will send your requested word or phrase and some surrounding content from your document). In Excel, you can send categories of data to Microsoft in order to receive recommendations for other sets of similar data that might interest you, but the actual content from your workbook isn\'t sent to Microsoft. In addition, Office will send data about the software you\'re using and the locale to which your system is set. If required by a third-party content provider, it will also send authorization data indicating you have the right to download the relevant content. Frequently, the information you receive includes a link to additional information from the content provider\'s website. If you click the link, the content provider may place a <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">cookie</a> on your device to identify you for future transactions.</p><p><strong>Translation service</strong>. Some Office applications allow you to translate some or all of your document by using a bilingual dictionary or a machine translation. If a word or phrase you want to translate isn\'t in the bilingual dictionary included with your application software, the word or phrase is sent unencrypted to a Microsoft or a third-party translation service. If you choose to translate your entire document, the entire document is sent unencrypted to a Microsoft or a third-party translation service. In addition to the word or phrase you want to translate, Office sends information about the Office software you are using, including the version, operating system, and locale and language to which your system is set. For third-party translation services, Office might also send previously stored authentication information indicating that you previously signed up for access to the website.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">OneDrive</span><span id="navigationHeader">OneDrive</span><span id="moduleName">mainonedrivemodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\n OneDrive lets you store and access your files on virtually any device. You can also share and collaborate on your files with others. Some versions of the OneDrive application enable you to access both your personal OneDrive by signing in with your personal Microsoft account and your OneDrive for Business by signing in with your work or school Microsoft account\xa0as part of your organization\'s use of Office 365.\r\n </p><p>\r\n When you store content in OneDrive, that content will inherit the sharing permissions of the folder in which you store it. For example, if you store content in a public folder, the content will be public and available to anyone on the Internet who can find the folder.\r\n </p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>\r\n OneDrive lets you store and access your files on virtually any device. You can also share and collaborate on your files with others. Some versions of the OneDrive application enable you to access both your personal OneDrive by signing in with your personal Microsoft account and your OneDrive for Business by signing in with your work or school Microsoft account as part of your organization\'s use of Office 365.\r\n </p><p>\r\n When you use OneDrive, we collect data about your usage of the service, as well as the content you store in order to provide, improve and protect the services. Examples include, indexing the contents of your OneDrive documents so that you can search for them later and using location information to enable you to search for photos based on where the photo was taken. We also collect device information so we can deliver personalized experiences, such as enabling you\xa0to sync content across devices and roam customized settings.\r\n </p><p>\r\n When you store content in OneDrive, that content will inherit the sharing permissions of the folder in which you store it. For example, if you store content in the public folder, the content will be public and available to anyone on the Internet who can find the folder. If you store content in a private folder, the content will be private.\r\n </p><p>\r\n When you share content to a social network like Facebook from a phone that you have synced with your OneDrive account, your content is either uploaded to that network or a link to that content is posted to that network. Content posted to social networks and hosted on OneDrive is accessible to anyone on that social network. To delete the content, you need to delete it from the social network and from OneDrive.\r\n </p><p>\r\n When you share your OneDrive content with your friends via a link, an email with the link is sent to those friends. The link contains an authorization code that allows anyone with the link to access your content. If one of your friends sends the link to other people, they will also be able to access your content, even if you did not choose to share the content with them. To revoke permissions for your content on OneDrive, sign into your\xa0account and then select the specific content to manage the permission levels. Revoking permissions for a link effectively deactivates the link. No one will be able to use the link to access the content unless you decide to share the link again.\r\n </p><p>\r\n Files managed with OneDrive for Business are stored separately from files stored with your personal OneDrive. OneDrive for Business\xa0collects and transmits personal data for authentication, such as your email address and password, which will be transmitted to Microsoft and/or to the provider of your Office 365 service.\r\n </p></span></div><div class="divModuleDescription"><span id="Header">Outlook</span><span id="navigationHeader">Outlook</span><span id="moduleName">mainoutlookmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Outlook products are designed to improve your productivity through improved communications and include Outlook.com, Outlook applications, and related services. Outlook.com is Microsoft\'s primary consumer email service, and includes email accounts with addresses that end in outlook.com, live.com, hotmail.com, and msn.com. Outlook applications include desktop and mobile apps that permit you to manage email, calendar items, files, contacts, and other data.</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>Outlook products are designed to improve your productivity through improved communications and include Outlook.com, Outlook applications, and related services.</p><p><strong>Outlook.com</strong>. Outlook.com is Microsoft\'s primary consumer email service, and includes email accounts with addresses that end in outlook.com, live.com, hotmail.com, and msn.com. Outlook.com provides features that let you connect with your friends on social networks. You will need to create a <a class="mscom-link" href="#mainmicrosoftaccountmodule">Microsoft account</a> to use Outlook.com.</p><p>When you delete an email or item from a mailbox in Outlook.com, the item generally goes into your Deleted Items folder where it remains for approximately 7 days unless you move it back to your inbox, you empty the folder, or the service empties the folder automatically, whichever comes first. When the Deleted Items folder is emptied, those emptied items remain in our system for up to 30 days before final deletion.</p><p><strong>Outlook Applications</strong>. Outlook client applications are software you install on your device that permits you to manage email, calendar items, files, contacts, and other data from email, file storage, and other services, like Exchange Online or Outlook.com, or servers, like Microsoft Exchange. You can use multiple accounts from different providers, including third-party providers, with Outlook applications.</p><p>To add an account, you must provide permission for Outlook to access data from the email or file storage services.</p><p>When you add an account to Outlook, your mail, calendar items, files, contacts, settings and other data from that account will automatically sync to your device. If you are using the mobile Outlook application, that data will also sync to Microsoft servers to enable additional features such as, faster search, personalized filtering of less important mail, and an ability add email attachments from linked file storage providers without leaving the Outlook application. If you are using the desktop Outlook application, you can choose whether to allow the data to sync to our servers. At any time, you can remove an account or make changes to the data that is synced from your account.</p><p>If you add an account provided by an organization (such as your employer or school), the owner of the organizational domain can implement policies and controls (for example, requiring multi-factor authentication or the ability to remotely wipe data from your device) that can affect your use of Outlook.</p><p>To learn more about the data the Outlook applications collect and process, please see the <a class="mscom-link" href="#mainofficeservicesmodule">Office</a> section of this privacy statement.</p></span></div><div class="divModuleDescription"><span id="Header">Silverlight</span><span id="navigationHeader">Silverlight</span><span id="moduleName">mainsilverlightmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Microsoft Silverlight helps you to access and enjoy rich content on the Web. Silverlight enables websites and services to store data on your device. Other Silverlight features involve connecting to Microsoft to obtain updates, or to Microsoft or third-party servers to play protected digital content.\r\n</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>\r\n Microsoft Silverlight helps you to access and enjoy rich content on the Web. Silverlight enables websites and services to store data on your device. Other Silverlight features involve connecting to Microsoft to obtain updates, or to Microsoft or third-party servers to play protected digital content.\r\n </p><p><strong>Silverlight Configuration tool.</strong> You can make choices about these features in the Silverlight Configuration tool. To access the Silverlight Configuration tool, right click on content that is currently being displayed by Silverlight and select <strong>Silverlight</strong>. You can also run the Silverlight Configuration tool directly. In Windows, for example, you can access the tool by searching for "Microsoft Silverlight." </p><p><strong>Silverlight application storage. </strong>Silverlight-based applications can store data files locally on your computer for a variety of purposes, including saving your custom settings, storing large files for graphically intensive features (such as games, maps, and images), and storing content that you create within certain applications. You can turn off or configure application storage in the Silverlight Configuration tool.\r\n </p><p><strong>Silverlight updates. </strong>Silverlight will periodically check a Microsoft server for updates to provide you with the latest features and improvements. A small file containing information about the latest Silverlight version will be downloaded to your computer and compared to your currently installed version. If a newer version is available, it will be downloaded and installed on your computer. You can turn off or configure updates in the Silverlight Configuration tool.\r\n </p><p><strong>Digital Rights Management. </strong>Silverlight uses Microsoft Digital Rights Management (DRM) technology to help protect the rights of content owners. If you access DRM-protected content (such as music or video) with Silverlight, it will request media usage rights from a rights server on the Internet. In order to provide a seamless playback experience, you will not be prompted before Silverlight sends the request to the rights server. When requesting media usage rights, Silverlight will provide the rights server with an ID for the DRM-protected content file and basic data about your device, including data about the DRM components on your device such as their revision and security levels, and a unique identifier for your device.\r\n </p><p><strong>DRM updates.</strong> In some cases, accessing DRM-protected content will require an update to Silverlight or to the DRM components on your device. When you attempt to play content that requires a DRM update, Silverlight will send a request to a Microsoft server containing basic data about your device, including information about the DRM components on your computer such as their revision and security levels, troubleshooting data, and a unique identifier for your device. The Microsoft server uses this identifier to return a unique DRM update for your device, which will then be installed by Silverlight. You can turn off or configure DRM component updates on the <strong>Playback</strong> tab in the Silverlight Configuration tool.\r\n </p></span></div><div class="divModuleDescription"><span id="Header">Skype</span><span id="navigationHeader">Skype</span><span id="moduleName">mainskypemodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Skype lets you send and receive voice, video and instant message communications. As part of providing these features, Microsoft collects, uses and shares personal data, including data about your communications, as described in more detail in Learn More.\t\r\n</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>Skype lets you send and receive voice, video and instant message communications. This section applies to the consumer version of Skype; if you are using Skype for Business, see the <a class="mscom-link" href="#mainenterpriseservicesmodule">Enterprise Products</a> section of this privacy statement. Both Microsoft Corporation and Skype Communications S.\xe0.r.l. (a wholly-owned Microsoft subsidiary based in Luxembourg) are data controllers for Skype, and references to Microsoft in this section refer to both legal entities.</p><p>As part of providing these features, Microsoft collects usage data about your communications that includes the time and date of the communication and the numbers or usernames that are part of the communication. </p><p><strong>Skype profile</strong>. To enable other people to find you on Skype (or products that interact with Skype, such as Skype for Business), depending on your profile settings, your Skype profile is included in the search directory. Your profile includes your username, avatar, and any other data you choose to add to your profile or display to others.</p><p><strong>Skype Contacts</strong>. If you use a Microsoft service, such as Outlook.com, to manage contacts, Skype will automatically add the people you know to your Skype contact list. With your permission, Skype will also check your device or other address books from time to time to automatically add your friends as Skype contacts. You can block users if you don\u2019t want to receive their communications. </p><p><strong>Partner companies</strong>. To make Skype available to more people, we partner with other companies to allow Skype to be offered via those companies\u2019 services. If you use Skype through a company other than Microsoft, that company\u2019s privacy policy governs how it handles your data. To comply with applicable law or respond to valid legal process, or to help our partner company or local operator comply or respond, we may access, transfer, disclose, and preserve your data. That data could include, for example, your private content, such as the content of your instant messages, stored video messages, voicemails, or file transfers. </p><p><strong>Skype Manager</strong>. Skype Manager lets you manage a group\u2019s (such as your family\u2019s) Skype usage from one central place. When you set up a group, you will be the Skype Manager Administrator and can see the patterns of usage, including detailed information, like traffic data and details of purchases, of other members of the group who have consented to such access. If you add information like your name, other people in the group will be able to see it. Members of the group can withdraw consent for Skype Manager on their account page at <a target="_blank" class="mscom-link" href="https://www.skype.com/">www.skype.com</a>. </p><p><strong>Skype marketing affiliate program.</strong> So that more people can learn about Skype, we encourage other companies and organizations to sign up as marketing affiliates to refer people to Skype. When the people they refer do things like buy Skype Credit, we pay them. We partner with another company, Conversant Media, to operate our affiliate network. Microsoft, our network partner, and the marketing affiliates use cookies and web beacons so we can know which marketing affiliate made a successful referral and earned a payment. Microsoft doesn\u2019t control the cookies that the marketing affiliates set. For more information on the privacy practices of our network partner, visit <a target="_blank" class="mscom-link" href="http://www.conversantmedia.com/legal/privacy">www.conversantmedia.com/legal/privacy</a>.</p><p><strong>Push notifications</strong>. To let you know of incoming calls, chats and other messages, Skype apps use the notification service on your device. For many devices, these services are provided by a another company. To tell you who is calling, for example, or to give you the first few words of the new chat, Skype has to tell the notification service so that they can provide the notification to you. The company providing the notification service on your device will use this information in accordance with their own terms and privacy policy. Microsoft is not responsible for the data collected by company providing the notification service. If you don\u2019t want to use the notification services for incoming Skype calls and messages, turn it off in the settings found in the Skype application or your device. </p><p><strong>Skype advertising</strong>. Some Skype software includes interest-based advertising, so that you\u2019re more likely to see ads you\u2019ll like. In some versions of the software, you can opt out of interest-based advertising in the privacy options or account settings menu. If you sign in to Skype with a Microsoft account, you can opt out of interest-based advertising at <a target="_blank" class="mscom-link" href="https://choice.microsoft.com">choice.microsoft.com</a>. If you opt out, you\u2019ll still see ads displayed in the Skype software based on your country of residence, language preference, and IP address location, but other data is not used for ad targeting.</p><p><strong>Translation features</strong>. To help you communicate with people in different languages, some Skype apps offer audio and/or text translation features. When you use translation features, your voice and text data are used to provide and improve Microsoft speech recognition and translation services.</p><p><strong>Recording features</strong>. Some versions of Skype have a recording feature that allows you to capture and share audio and/or video clips of your conversation. If you choose to record a session, the recording may include a few seconds of the call held in memory prior to your initiating the recording. The recording will be stored as part of your conversation history and may also be stored locally on your device. <strong><em>You should understand your legal responsibilities before recording any communication. This includes whether you need to get consent from all parties to the communication in advance.</em></strong> Microsoft is not responsible for how you use your recordings or the recording features.</p></span></div><div class="divModuleDescription"><span id="Header">Store</span><span id="navigationHeader">Store</span><span id="moduleName">mainwindowsstoremodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>The Store is an online service that allows you to browse, download, pur chase, rate, and review applications and other digital content. It includes the Windows Store, Xbox Store, and Office Store. </p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>The Store is an online service that allows you to browse, download, purchase, rate, and review applications and other digital content. It includes:</p><ul><li>Windows Store for apps and content for Windows devices such as phones, PCs, and tablets,</li><li>Xbox Store for games and other apps for Xbox ONE and Xbox 360 consoles, and</li><li>Office Store for products and apps for Office, SharePoint, Exchange, Access and Project (2013 versions or later).</li></ul><p>We collect data about how you access and use the Store; the products you\'ve viewed, purchased, or installed; the preferences you set for viewing apps in the Store; and any ratings, reviews or problem reports you submit. Your Microsoft account is associated with your ratings and reviews; and if you write a review, the name and picture from your Microsoft account will be published with your review.</p><p><strong>Permission for Store apps</strong>. Many apps you install from the Windows Store are designed to take advantage of specific hardware and software features of your device. An app\'s use of certain hardware and software features may give the app or its related service access to your data. For example, a photo editing app might access your device\'s camera to let you take a new photo or access photos or videos stored on your device for editing, and a restaurant guide might use your location to provide nearby recommendations. Information about the features that an app uses is provided on the app\'s product description page in the Store. Many of the features that Windows Store apps use can be turned on or off through your device\u2019s privacy settings. In Windows, in many cases, you can choose which apps can use a particular feature. Go to <strong>Start &gt; Settings &gt; Privacy</strong>. Select the feature (for example, Calendar) and select which app permissions are on or off. The lists of apps in Windows privacy settings that can use hardware and software features will not include "Classic Windows" applications, and these applications are not affected by these settings. \r\n </p><p><strong>App updates</strong>. Unless you have turned off automatic app updates in the relevant Store settings, the Store will automatically check for, download, and install app updates to ensure that you have the latest versions. Updated apps might use different Windows hardware and software features from the previous versions, which could give them access to different data on your device. You will be prompted for consent if an updated app accesses certain features, such as location. You can also review the hardware and software features an app uses by viewing its product description page in the Windows Store.</p><p>Each app\'s use of your data collected through any of these features is subject to the app developer\'s privacy policies. If an app available through the Windows Store collects and uses any of your personal data, the app developer is required to provide a privacy policy, and a link to the privacy policy is available on the app\'s product description page in the Store.</p><p><strong>Sideloaded apps and developer mode</strong>. Developer features such as the "developer mode" setting are intended for development use only. If you enable developer features, your device may become unreliable or unusable, and expose you to security risks. Downloading or otherwise acquiring apps from sources other than the Store, also known as "sideloading" apps, may make your device and personal data more vulnerable to attack or unexpected use by apps. Windows policies, notifications, permissions and other features intended to help protect your privacy when apps access your data may not function as described in this statement for sideloaded apps or when developer features are enabled.</p></span></div><div class="divModuleDescription"><span id="Header">SwiftKey</span><span id="navigationHeader">SwiftKey</span><span id="moduleName">mainswiftkeymodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>SwiftKey Keyboard and related apps and services collect and use data about how you type to learn your writing style and provide personalized autocorrect and predictive text that adapts to you.</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>SwiftKey Keyboard and related apps and services use data about how you type \u2013 including the emoji you use and the words that matter to you \u2013 to learn your writing style and provide personalized autocorrect and predictive text that adapts to you.</p><p>When you use our products, we collect data such as device, network, performance, and usage statistics. We use this data to operate and improve the products.</p><p>If you opt in to SwiftKey Cloud, we will collect your email address, basic demographic data, and data about the words and phrases you use to enable services such as personalization, prediction synchronization, and backup. Our prediction technology learns from the way you use language to build a personalized language model. This model is an optimized view of the words and phrases that you use most often, and reflects your unique writing style. To do this, the SwiftKey Keyboard for Android accesses your SMS messages upon first installation. The SwiftKey personalization service, which is a feature of SwiftKey Cloud, also accesses your recent content from online services that you specify, such as Gmail, Facebook and Twitter. If you are logged into SwiftKey Cloud, this data will be transferred over encrypted channels to our servers. Where a field has been flagged by a website or app as denoting a password field or payment data, SwiftKey does not log, store, or learn from this data.</p><p>If you are not logged into SwiftKey Cloud, language insights will not be collected from your device. You may at any time withdraw your consent for our use and retention of personal data collected by SwiftKey by going to the SwiftKey Cloud section in SwiftKey Settings. By withdrawing consent, your personal data collected through your use of the SwiftKey Keyboard will be deleted.</p><p>You may receive occasional notifications on your device alerting you to product updates and features that may be of interest to you. You can disable these notifications in our products at any time by going to the SwiftKey Settings.</p></span></div><div class="divModuleDescription"><span id="Header">Windows</span><span id="navigationHeader">Windows</span><span id="moduleName">mainwindowsmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Windows is a personalized computing environment that enables you to seamlessly roam and access services, preferences and content across your computing devices from phones to tablets to the Surface Hub. Rather than residing as a static software program on your device, key components of Windows are cloud-based, and both cloud and local elements of Windows are updated regularly, providing you with the latest improvements and features. In order to provide this computing experience, we collect data about you, your device, and the way you use Windows. And because Windows is personal to you, we give you choices about the personal data we collect and how we use it. Note that if your Windows device is managed by your organization (such as your employer or school), your organization may use centralized management tools provided by Microsoft or others to control device settings, device policies, software updates, data collection by us or the organization, or other aspects of your device. For more information about data collection and privacy in Windows, go to <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/?LinkId=529552">go.microsoft.com/fwlink/?LinkId=529552</a>. Legacy versions of Windows (including Vista, 7, 8, and 8.1) are subject to their own privacy statements.</p></span></div><div class="divModuleDescription"><span id="Header">Activation</span><span id="navigationHeader">Activation</span><span id="moduleName">mainactivationmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>When you activate Windows, a specific product key is associated with the device on which your software is installed. The product key and data about the software and your device is sent to Microsoft to help validate your license to the software. This data may be sent again if there is a need to re-activate or validate your license. On phones running Windows, device and network identifiers, as well as device location at the time of the first power up of the device, are also sent to Microsoft for the purpose of warranty registration, stock replenishment, and fraud prevention.</p></span></div><div class="divModuleDescription"><span id="Header">Advertising ID</span><span id="navigationHeader">Advertising ID</span><span id="moduleName">mainadvertisingidmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\nWindows generates a unique advertising ID for each user on a device. When the advertising ID is enabled, apps can access and use the advertising ID in much the same way that websites can access and use a unique identifier stored in a cookie. Thus, your advertising ID can be used by app developers (and the advertising networks they work with) to provide more relevant advertising and other personalized experiences across their apps. You can turn off access to this identifier at any time in the device Settings. If you choose to turn it on again, the advertising ID will be reset and a new identifier will be generated. When a third-party app accesses the advertising ID, its use of the advertising ID will be subject to its own privacy policy. For more information on Microsoft\u2019s use of data for advertising, see the <a class="mscom-link" href="#mainhowweusepersonaldatamodule">How We Use Data</a> section of this statement.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Location Services, Motion Sensing, &amp; Recording</span><span id="navigationHeader">Location Services, Motion Sensing, &amp; Recording</span><span id="moduleName">mainlocationservicesmotionsensingmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p><strong>Windows location service.</strong> Microsoft operates a location service that helps determine the precise geographic location of a specific Windows device. Depending on the capabilities of the device, location is determined using satellite global positioning service (GPS), detecting nearby cell towers and/or Wi-Fi access points and comparing that information against a database that Microsoft maintains of cell towers and Wi-Fi access points whose location is known, or deriving location from your IP address. When the location service is active on a Windows device, data about cell towers and Wi-Fi access points and their locations is collected by Microsoft and added to the location database after removing any data identifying the person or device from which it was collected. Microsoft may also share this de-identified location data with third parties to provide and improve location and mapping services.</p><p>Windows services and features (such as browsers and Cortana), applications running on Windows, and websites opened in Windows browsers can access the Windows location service to determine precise location if you allow them to do so. Some features and apps request precise location permission when you first install Windows, some ask the first time you use the app, and others ask every time you access the location service. For information about certain Windows apps that use the location service, see the \r\n <a id="mainwindowsappsmodulefromLocationService" class="mscom-link" href="#mainwindowsappsmodule">Windows Apps</a> section below.\r\n</p><p>When the location service is accessed, your Windows device will also upload its location to Microsoft, and we will retain only the last known location (each new location replaces the previous one) to improve the efficiency and operation of our services. Data about a Windows device\'s recent location history is stored on the device, and certain apps and Windows features can access this location history. You can clear your device\'s location history at any time in the device\'s Settings menu. \r\n</p><p>\r\n In Settings, you can also view which applications have access to the location service or your device\'s location history, turn off or on access to the location service for particular applications, or turn off the location service. You can also set a default location, which will be used when the location service can\u2019t detect a more exact location for your device.\r\n</p><p>Note that on mobile devices, your mobile operator will have access to your location even if you turn off the location service. </p><p><strong>General Location</strong>. If you turn on the General Location feature, apps that cannot use your precise location will have access to your general location, such as your city, postal code, or region.</p><p><strong>Find My Phone.</strong> The Find My Phone feature allows you to find the location of your Windows phone from <a target="_blank" class="mscom-link" href="https://account.microsoft.com/">account.microsoft.com</a>, even if you have turned off all access to the location service on the phone. If you have turned on the "save my location every few hours" feature in the Find My Phone settings on your phone, the Find My Phone feature will periodically send and store a single last known location of your phone, even if you have turned off location services on your phone. Each time a new location is sent, it replaces the previously-stored location.\r\n</p><p><strong>Find My Device.</strong> The Find My Device feature allows\xa0an administrator of a Windows PC or tablet to find the location of that device if the administrator has enabled the location service for the device, even if other users have disabled location for themselves. When the administrator attempts to locate the device, users will see a notification in the notification center.\r\n</p><p><strong>Windows Motion Sensing.</strong> Windows devices with motion activity detection can collect motion activity. This data can enable features such as a pedometer to count the number of steps you take, so a fitness application can estimate how many calories you burn. This data and history is stored on your device and can be accessed by applications you give permission to access and use that data.\r\n</p><p><strong>Recording.</strong> Some Windows devices have a recording feature that allows you to capture audio and video clips of your activity on the device, including your communications with others. If you choose to record a session, the recording will be saved locally on your device. <strong>You\xa0should understand your legal responsibilities before recording any communication. This includes whether you need to get consent from all parties to the communication in advance. </strong>Microsoft is not responsible for how you use recording features or your recordings.\xa0\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Security and Safety Features</span><span id="navigationHeader">Security and Safety Features</span><span id="moduleName">mainsecurityandsafetyfeaturesmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p><strong>Device encryption. </strong>Device encryption helps protect the data stored on your device by encrypting it using BitLocker Drive Encryption technology. When device encryption is on, Windows automatically encrypts the drive Windows is installed on and generates a recovery key. The BitLocker recovery key for your personal device is automatically bac ked up online in your personal Microsoft OneDrive account. Microsoft doesn\'t use your individual recovery keys for any purpose.\xa0\r\n</p><p><strong>Malicious Software Removal Tool.</strong> The Malicious Software Removal Tool (MSRT) runs on your device at least once per month as part of Windows Update. MSRT checks devices for infections by specific, prevalent malicious software ("malware") and helps remove any infections found. When the MSRT runs, it will remove the malware listed on the Microsoft Support website if the malware is on your device. During a malware check, a report will be sent to Microsoft with specific data about malware detected, errors, and other data about your device. If you do not want MSRT to send this data to Microsoft, you can disable MSRT\'s reporting component.\r\n</p><p><strong>Microsoft Family. </strong>Parents can use Microsoft Family to understand and set boundaries on how their child is using their device. There are many features available to Family members, so please carefully review the information provided when you create or join a Family. When Family activity reporting is turned on for a child, Microsoft will collect details about how the child uses their device and provide parents with reports of that child\'s activities. Activity reports are routinely deleted from Microsoft servers after a short period of time.\r\n</p><p><strong>SmartScreen.</strong> SmartScreen helps protect you when using our services by checking downloaded files and web content for malicious software, potentially unsafe web content, and other threats to you or your device. When checking a file, data about that file is sent to Microsoft, including the file name, a hash of the file\'s contents, and the file\'s digital certificates. If SmartScreen identifies the file as unknown or potentially unsafe, you will see a warning prior to opening the file. When checking web content, data about the content is sent to Microsoft, including the full web address of the content. If SmartScreen detects that content is potentially unsafe, you will see a warning in place of the content. SmartScreen can be turned on or off in Settings.\r\n</p><p><strong>Windows Defender.</strong> Windows Defender looks for malware and other unwanted software on your device. Windows Defender is automatically turned on to help protect your device if no other antimalware software is actively protecting your device. If Windows Defender is turned on, it will monitor the security status of your device. When Windows Defender is turned on, or is running because Limited Periodic Scanning is enabled, it will automatically send reports to Microsoft that contain data about suspected malware and other unwanted software, and it may also send files that could contain malware. If a report is likely to contain personal data, the report is not sent automatically and you\'ll be prompted before it is sent. You can configure Windows Defender not to send reports and suspected malware to Microsoft.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Speech, Inking and Typing</span><span id="navigationHeader">Speech, Inking and Typing</span><span id="moduleName">mainspeechinkingtypingmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Microsoft collects and uses data about your speech, inking (handwriting), and typing on Windows devices to help improve and personalize our ability to correctly recognize your input. This feature is also known as Getting to Know You.</p><p>For example, to provide personalized speech recognition, we collect your voice input. If you\u2019ve given permission in Cortana, we also collect your name and nickname, your recent calendar events and the names of the people in your appointments, information about your contacts including names and nicknames, names of your favorite places, apps you use, and information about your music preferences. This additional data enables us to better recognize people, events, places, and music when you dictate commands, messages, or documents.</p><p>Additionally, your typed and handwritten words are collected to provide you a personalized user dictionary, help you type and write on your device with better character recognition, and provide you with text suggestions as you type or write. Typing data includes a sample of characters and words you type, which we scrub to remove IDs, IP addresses, and other potential identifiers. It also includes associated performance data, such as changes you manually make to text as well as words you\'ve added to the dictionary.</p><p>You can turn off Getting to Know You at any time. This will stop the data collection for this feature and will delete associated data stored on your device, such as your local user dictionary and your input history. Because Cortana uses this data to help understand your input, turning off Getting to Know You will also disable speech recognition in Cortana. At <a target="_blank" class="mscom-link" href="https://www.bing.com/account/personalization">https://www.bing.com/account/personalization</a>, you can also sign in with your personal Microsoft account and clear data sent to Microsoft, such as your contacts and calendar data, as well as search and browsing history if your device also had Cortana enabled.</p></span></div><div class="divModuleDescription"><span id="Header">Sync Settings</span><span id="navigationHeader">Sync Settings</span><span id="moduleName">mainsyncsettingsmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\n When you sign into Windows with a Microsoft account, Windows syncs some of your settings and data with Microsoft servers to make it easier to have personalized experiences across multiple devices. After you\'ve signed into one or more devices with a Microsoft account, when you sign into another with the same Microsoft account for the first time, Windows will download and apply the settings and data you choose to sync from your other devices. Settings you choose to sync will automatically update on Microsoft servers and your other devices as you use them.\r\n</p><p>Some of the settings that are synced include:</p><ul><li>Apps you\'ve installed from the Windows Store </li><li>Language preferences </li><li>Ease of Access preferences </li><li>Personalization settings such as your account picture, background, and mouse settings </li><li>Settings for Windows Store apps </li><li>Spell checker dictionaries, input method editor (IME) dictionaries, and personal dictionaries </li><li>Internet Explorer browser history, favorites, and websites you have open </li><li>Saved app, website, mobile hotspot, and Wi-Fi network names and passwords </li></ul><p>\r\n You can choose whether to sync your settings, and control what is synced, by going to Sync Settings in the Accounts section of Windows Settings. Some apps have their own, separate sync controls. If you sign into Windows with a work account and you choose to connect that account to your personal Microsoft account, Windows will ask which settings you want to sync before connecting your Microsoft account. \r\n</p></span></div><div class="divModuleDescription"><span id="Header">Telemetry &amp; Error Reporting</span><span id="navigationHeader">Telemetry &amp; Error Reporting</span><span id="moduleName">maintelemetryerrorreportingmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>As you use Windows, we collect diagnostic and usage data that helps us identify and troubleshoot problems, improve our products and services, and provide you with personalized experiences. This data is transmitted to Microsoft and stored with one or more unique identifiers that can help us recognize an individual user on an individual device and understand the device\'s service issues and use patterns. There are three levels of diagnostic and usage data: <strong>Full</strong>, <strong>Enhanced</strong> and <strong>Basic</strong>. You can select which level of diagnostic and usage data to provide, but some diagnostic data is vital to the operation of Windows and cannot be turned off.</p><p>During Windows setup, opting to "Send full error and diagnostic reporting to Microsoft" sets your <strong>Diagnostic and usage data</strong> setting to <strong>Full</strong>. If you don\u2019t choose to "Send full error and diagnostic reporting to Microsoft," <strong>Diagnostic and usage data</strong> collection will be set to <strong>Enhanced</strong>. You can adjust your Diagnostic and usage data collection level at any time in <strong>Settings</strong>. We recommend that you select <strong>Full</strong> for the best Windows experience and the most effective troubleshooting.</p><p><strong>Basic</strong> data is data that is vital to the operation of Windows. This data helps keep Windows and apps secure, up-to-date, and running properly by letting Microsoft know the capabilities of your device, what is installed, and whether Windows is operating correctly. This option also includes basic error reporting back to Microsoft. Basic data includes:</p><ul><li>Configuration data, including the manufacturer of your device, model, number of processors, display size and resolution, date, region and language settings, and other data about the capabilities of the device. </li><li>The software (including drivers and firmware supplied by device manufacturers), installed on the device.</li><li>Performance and reliability data, such as which programs are launched on a device, how long they run, how quickly they respond to input, how many problems are experienced with an app or device, and how quickly information is sent or received over a network connection.</li><li>Network and connection data, such as the device\u2019s IP address, number of network connections in use, and data about the networks you connect to, such as mobile networks, Bluetooth, and connection requirements and speed of Wi-Fi networks you connect to. </li><li>Other hardware devices connected to the device.</li></ul><p><strong>Enhanced</strong> data includes all <strong>Basic</strong> data plus data about how you use Windows, including Microsoft and third party software (apps, drivers, etc.) that runs on Windows. This data includes how you use certain features or apps and for how long, which apps and features you use most often, how often you use Windows Help and Support, which services you use to sign into apps, and identifiers related to the wireless networks you connect to (BSSID and SSID). This option also lets us collect diagnostic data related to system or app crashes. If you select this option, we\'ll also be able to provide you with an enhanced and more personalized Windows experience. </p><p><strong>Full</strong> data includes all <strong>Basic</strong> and <strong>Enhanced</strong> data, plus additional diagnostic data including the memory state of your device when a system or app crash occurs (which may unintentionally include parts of a document you were using when a problem occurred). It also turns on advanced diagnostic features that can collect additional data from your device, which helps us further troubleshoot and fix problems. When devices experience problems that are difficult to diagnose or replicate with Microsoft\'s internal testing, Microsoft will randomly select a small number of devices, from those at the Full level and exhibiting the problem, from which to gather all of the data needed to diagnose and fix the problem (including user content that may have triggered the issue). If an error report contains personal data, we won\u2019t use that information to identify, contact, or target advertising to you.</p><p>Windows error reports help Microsoft and Microsoft partners diagnose problems in the software you use and provide solutions. We provide limited portions of error report information to partners (such as OEMs) to help them troubleshoot products and services which work with Windows and other Microsoft product and services. They are only permitted to use this information to repair or improve those products and services. </p></span></div><div class="divModuleDescription"><span id="Header">Update Services</span><span id="navigationHeader">Update Services</span><span id="moduleName">mainupdateservicesmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\n Update Services for Windows includes Windows Update and Microsoft Update. Windows Update is a service that provides you with software updates for Windows software and other supporting software, such as drivers and firmware supplied by device manufacturers. Microsoft Update is a service that provides you with software updates for other Microsoft software such as\xa0<a class="mscom-link" href="#mainofficemodule">Office</a>.\r\n</p><p>\r\n Windows Update automatically downloads Windows software updates to your device. You can configure Windows Update to automatically install these updates as they become available (recommended) or have Windows notify you when a restart is required to finish installing updates. Apps available through the Windows Store are automatically updated through the Store, as described in the\xa0<a id="mainwindowsstoremodulefromUpdateServices" class="mscom-link" href="#mainwindowsstoremodule">Store</a> section above.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Web Browsers: Microsoft Edge and Internet Explorer</span><span id="navigationHeader">Web Browsers: Microsoft Edge and Internet Explorer</span><span id="moduleName">mainwebbrowsersmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Microsoft Edge is Microsoft\'s default web browser for Windows. Internet Explorer, Microsoft\'s legacy browser, is also available in Windows. Whenever you use a web browser to access the Internet, data about your device ("standard device data") is sent to the websites you visit and online services you use. Standard device data includes your device\'s IP address, browser type and language, access times, and referring website addresses. This data might be logged on those websites\' web servers. Which data is logged and how that data is used depends on the privacy practices of the websites you visit and web services you use. </p><p>Additionally, data about how you use your browser, such as your browsing history, web form data, temporary Internet files, and <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">cookies</a>, is stored on your device. You can delete this data from your device using Delete Browsing History. </p><p>New features in Microsoft Edge allow you to capture and save content on your device, such as:</p><ul><li><strong>Web Note</strong>: which allows you to create ink and text annotations on the web pages you visit, and clip, save or share them; </li><li><strong>Active Reading</strong>: which allows you to create and manage reading lists including websites or documents; and </li><li><strong>Hub</strong>: which allows you to easily manage your reading lists, favorites, downloads, and history all in one area. </li></ul><p>\r\n Some Microsoft browser information saved on your device will be synced across other devices when you sign in with your Microsoft account. For instance, in Internet Explorer, this information includes your browsing history and favorites; and in Microsoft Edge, it includes your favorites and reading lists. As an example, if you sync your Microsoft Edge reading list across devices, copies of the content you choose to save to your reading list will be sent to each synced device for later viewing. You can disable syncing in Internet Explorer by going to Sync Settings in the Accounts section of Windows Settings (see\r\n <a id="mainsyncsettingsmodulefromWeb" class="mscom-link" href="#mainsyncsettingsmodule">Sync Settings</a>). You can also disable syncing of Microsoft Edge browser information by turning off the sync option in Microsoft Edge Settings.\r\n</p><p>Microsoft Edge and Internet Explorer use your search queries and browsing history to provide you with faster browsing a nd more relevant search results. These features include:</p><ul><li><strong>AutoSearch and Search Suggestions</strong> in Internet Explorer automatically sends the information you type into the browser address bar to your default search provider (such as Bing) and offer search recommendations as you type each character. In Microsoft Edge, this feature automatically sends this information to Bing even if you have selected another default search provider.\r\n </li><li><strong>Page Prediction</strong> sends your browsing history to Microsoft and uses aggregated browsing history data to predict which pages you are likely to browse to next\xa0and proactively loads those pages in the background for a faster browsing experience.\r\n </li><li><strong>Suggested Sites</strong> recommends web contents that you might be interested in based on your search and browsing history.\xa0\r\n </li></ul><p>Browsing data collected in connection with these features is used in the aggregate and you can turn off any of these features at any time. These features will not collect browsing history while you have InPrivate Browsing enabled.</p><p>\r\n In order to provide search results, Microsoft Edge and Internet Explorer send your search queries, standard device information, and location (if you have location enabled) to your default search provider. If Bing is your default search provider, we use this data as described in the\xa0<a class="mscom-link" href="#mainbingmodule">Bing</a> section of this privacy statement.\r\n</p><p>\r\n Cortana can assist you with your web browsing in Microsoft Edge with features such as Ask Cortana. You can disable Cortana assistance in Microsoft Edge at any time in Microsoft Edge Settings. Separately, if you enable Cortana to use your browsing history in Cortana Permissions, Microsoft will collect your Microsoft Edge search queries and full browsing history, associated with a user ID. Cortana and related Microsoft products will use this data to learn about you and provide you with timely and intelligent answers and proactive personalized suggestions, or to complete web tasks for you. You can disable Cortana\u2019s access to your browsing history at any time in Cortana Permissions. To learn more about how Cortana uses data and how you can control that, go to the <a class="mscom-link" href="#maincortanamodule">Cortana</a> section of this privacy statement.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Wi-Fi Sense</span><span id="navigationHeader">Wi-Fi Sense</span><span id="moduleName">mainwi-fisensemodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Wi-Fi Sense allows you to automatically connect to Wi-Fi networks around you to help you save cellular data and give you more connection options. If you turn it on, you will automatically connect to open Wi-Fi networks. Please note that not all open networks are secure - be careful using an open network to do something online that requires sensitive or personal data, such as making a banking transaction or a purchase.</p></span></div><div class="divModuleDescription"><span id="Header">Windows Apps</span><span id="navigationHeader">Windows Apps</span><span id="moduleName">mainwindowsappsmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>A number of Microsoft apps are included with Windows and others are available in the Windows Store. Some of those apps include:</p><p><strong>Maps app.</strong> The Maps app provides location-based services and uses Bing services to process your searches within the Maps app. Please see the\r\n <a class="mscom-link" href="#mainbingmodule">Bing</a>\xa0section of this privacy statement to learn more about these Bing-powered experiences. When the Maps app has access to your location, even when the app is not in use, Microsoft may collect de-identified location data from your device to improve Microsoft\'s services. You can disable the Maps app\'s access to your location by turning off the location service or turning off the Maps app\'s access to the location service.\r\n</p><p>\r\n You can keep track of your favorite places and recent map searches in the Maps app. Your favorite places and search history will be included as search suggestions. If you\'re signed in with your Microsoft account, your favorite places, search history, and certain app settings will be synced across other devices and services (for example, Cortana). See <a id="mainsyncsettingsmodulefromWindowsApp" class="mscom-link" href="#mainsyncsettingsmodule">Sync Settings</a>\xa0above for more information.\r\n</p><p><strong>Camera and Photo apps.</strong> If you allow the Camera app to use your location, location data is embedded in the photos you take with your device. Other descriptive data, such as camera model and the date that the picture was taken, is also embedded in photos and videos. If you choose to share a photo or video, any embedded data will be accessible to the people and services you share with. You can disable the Camera app\'s access to your location by turning off all access to the location service in your device\'s Settings menu or turning off the Camera app\'s access to the location service.\r\n</p><p>\r\n Your photos, videos, as well as screenshots, saved in your camera roll automatically upload to OneDrive. You can manage your photos and/or videos in OneDrive, and you can disable the automatic upload in Settings.\r\n</p><p>\r\n When you take photos embedded with your location, the Photos app can group your photos by time and location. To group your photos, the Photos app sends location data in your photos to Microsoft to determine the names of locations, such as "Seattle, Washington". When you are using the Photo app while signed into your Microsoft account, your photos and videos from OneDrive will be automatically sorted in into albums in the Photo app, and will also appear on the Photo app\'s live tile. Your photos and/or videos will only be shared with others if you choose to do so.\r\n</p><p><strong>People app.</strong> The People app lets you see and interact with all your contacts in one place. When you add your Microsoft account to a Windows device, your contacts from your account will be automatically added to the People app. You can add other accounts to the People app, including your social networks (such as Facebook and Twitter) and email accounts. When you add an account, we tell you what data the People app can import or sync with the particular service and let you choose what you want to add. Other apps you install may also sync data to the People app, including providing additional details to existing contacts. You can remove an account from the People app at any time. \r\n</p><p><strong>Mail and Calendar app.</strong> The Mail and Calendar app allows you to connect all your email, calendars, and files in one place, including those from third-party email and file storage providers. The app provides location-based services, such as weather information in your calendar, but you can disable the app\u2019s use of your location. When you add an account to the Mail and Calendar app your email, calendar items, files, contacts, and other settings from your account will automatically sync to your device and to Microsoft\u2019s servers. At any time, you can remove an account or make changes to the data that\u2019s synced from your account. To configure an account, you must provide the app with the account credentials (such as user name and password), which will be sent over the Internet to the third-party provider\'s server. The app will first attempt to use a secure (SSL) connection to configure your account but will send this information unencrypted if your email provider does not support SSL. If you add an account provided by an organization (such as a company email address), the owner of the organizational domain can implement certain policies and controls (for example, multi-factor authentication or the ability to remotely wipe data from your device) that may affect your use of the app. </p><p><strong>Messaging app.</strong> When you sign in with a Microsoft account on your device, you can choose to back up your information, which will sync your SMS and MMS messages and store them in your Microsoft account. This allows you to retrieve the messages if you lose or change phones. After your initial device set-up, you can manage your messaging settings at any time. Turning off your SMS/MMS backup will not delete messages that have been previously backed up to your Microsoft account. To delete such messages from storage, you must delete them from your device prior to turning off backup. If you allow the Messaging app to use your location, you can attach a link to your current location to an outgoing message. Location information will be collected by Microsoft as described in the Windows <a id="mainsyncsettingsmodulefromWindowsApp" class="mscom-link" href="#mainlocationservicesmotionsensingmodule">Location Services</a> section.\r\n</p><p><strong>Microsoft Wallet.</strong> You can use Microsoft Wallet to hold information such as coupons, loyalty cards, tickets, and other digital content. Where available, you can also add payment cards to the Microsoft Wallet to make payments at participating stores using NFC (near-field communication).</p><p>You can set up your wallet for payment by logging into Microsoft Wallet with your personal Microsoft account and adding payment cards associated with your Microsoft account. When you add a payment card to Microsoft Wallet, we provide data to your bank and payment card network, including your name, card number, billing address, email address, device data (including the device name, type, and identifier), and your location at the time you add your payment card to your wallet. This data is sent to your bank and payment card network to determine the eligibility of your payment card, enable transactions, detect fraud.</p><p>When you make an NFC payment, Microsoft Wallet will provide the merchant with an encrypted version of your payment card (a \u201ctoken\u201d). The merchant will present this token, along with transaction details, to your bank to complete the transaction and request payment for your transaction.</p></span></div><div class="divModuleDescription"><span id="Header">Windows Hello</span><span id="navigationHeader">Windows Hello</span><span id="moduleName">mainwindowshellomodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\nWindows Hello provides instant access to your devices through biometric authentication.\xa0 If you turn it on, Windows Hello uses your face, fingerprint or iris to identify you based on a set of unique points or features that are extracted from the image and stored on your device as a template - but it does not store the actual picture or image of your face or iris. Biometric verification data that\'s used when you sign in doesn\'t leave your device. You can delete your biometric verification data from within Settings.\t\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Windows Search</span><span id="navigationHeader">Windows Search</span><span id="moduleName">mainwindowssearchmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Windows Search lets you search your stuff and the web from one place. If you choose to use Windows Search to search "your stuff", it will provide results for items on your OneDrive as well as on your device. If you choose to use Windows Search to search the web, or get search suggestions with Windows Search or Cortana, your search results will be powered by Bing and we will use your search query as described in the <a class="mscom-link" href="#mainbingmodule">Bing</a>\xa0section of this privacy statement.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Xbox</span><span id="navigationHeader">Xbox</span><span id="moduleName">mainxboxmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Xbox Live is Microsoft\'s online gaming and entertainment service and social network. Xbox services can be accessed from a variety of devices, including Xbox consoles, PCs (including via xbox.com and the Xbox app), and mobile devices. Microsoft collects data about your use of Xbox services, which can include information collected by the Kinect sensor. Some data, such as your gamertag and game scores, can be seen by other users.</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>\r\n Xbox consoles are hardware devices that you can use to access and play games, movies, music, and other forms of digital entertainment. Xbox Live (including Games for Windows Live) is Microsoft\'s online gaming and entertainment service and social network. It provides ways for you to connect with your friends on Xbox Live and other gaming and social networks. Xbox services can be accessed from a variety of devices, including Xbox consoles, PCs (including via xbox.com and the Xbox app), and mobile devices.\r\n</p><p>We collect data about your use of Xbox services, such as:</p><ul><li>When you sign in and sign out, the games you play, your game and score statistics, and the purchases you make and content you obtain. </li><li>Performance data about the Xbox services, your device and your network connection, including any hardware or software errors that occur. </li><li>If you use the Xbox console with Kinect, data about how you use Kinect. See below for more information about Kinect data collection. </li></ul><p>\r\n All such data is stored with the Xbox console\'s unique identifier and associated with your personal data. When your Xbox is connected to the Internet, we identify which console and which version of the Xbox operating system you are currently using.\r\n</p><p>\r\n With your consent, we will collect information about videos you purchase or view through third-party apps on your Xbox console. If you use the Xbox TV app, we collect TV viewing history from your console in a way that doesn\'t identify you or others.\r\n</p><p>\r\n If you use an Xbox console that includes a storage device (hard drive or memory unit), and if you play offline or have never signed into the services on the console, usage data will be stored on the storage device and sent to Microsoft the next time you sign into the services.\r\n</p><p><strong>Xbox Live data viewable by other users. </strong>Your gamertag (Xbox live nickname), game and score statistics, achievements, presence (whether you\'re signed into Xbox Live), and other data about your activity on Xbox Live can be seen by other users on Xbox Live or other properties associated with Xbox Live (including those of partner companies). For example, your gamertag and scores that show on game leaderboards are considered public and can\'t be hidden. For other types of data, you can adjust your privacy settings on the console or at\r\n <a target="_blank" class="mscom-link" href="https://www.xbox.com/">xbox.com</a> to limit or block the sharing with other users.\r\n</p><p><strong>Xbox Live data shared with game or app publishers. </strong>When you use an Xbox Live-enabled game or app, the publisher or service provider for that game or app has access to data about your usage of Xbox Live and that game or app, and may disclose or display (such as on leaderboards) such data. This data includes, for example, your game scores, data about your game play sessions (for example, types of vehicles used in the game), your presence on Xbox Live, the time you spend playing the game or app, rankings, statistics, gamer profiles, avatars, and other content that you may create or submit within the game or app.\r\n</p><p><strong>Linking your Xbox Live account to non-Microsoft accounts.</strong> Some of the games or apps found on Xbox Live are delivered by partner companies, which may require that you create a non-Microsoft account and sign-in credentials to use that game or app. If you choose to link your Microsoft account with your account with a partner company, Microsoft will share limited account information with that company. Such account information can include name, address, email and date of birth but will not include any credit card or other payment information. For games that enable in-game communications, the game publisher will also have access to the content of in-game communications when you are signed into your account with the publisher.\r\n</p><p><strong>Kinect.</strong> The Kinect sensor is a combination of camera, microphone, and infrared sensor that can enable motions and voice to be used to control gameplay and to navigate through the service. For example:\r\n</p><ul><li>If you choose, the camera can be used to sign you into the service automatically using facial recognition. To do this it takes an image of your face and measures distances between key points to create and store a numeric value that represents only you. This data stays on the console and is not shared with anyone, and you can choose to delete this data from your console at any time.</li><li>For gameplay, Kinect will map distances between your body\'s joints to create a stick figure representation of you that helps Kinect enable gameplay. If you are playing online, we collect those numeric values to enable and improve gameplay and the gaming experience. Kinect also detects specific hand gestures intended to do simple system interactions (such as menu navigation, pan/zoom and scroll). </li><li>For some fitness games, Xbox can use the Kinect sensor to estimate your exercise data, including estimates such as your heart rate during a certain activity or the number of calories burned during a workout. </li><li>Kinect\'s microphones enable voice chat between players during gameplay. They also enable voice commands for control of the console, game or app,\xa0or to enter search terms. See below for additional details on voice data collection. </li><li>The Kinect sensor can also be used for audio and video communications through services such as\r\n <a class="mscom-link" href="#mainskypemodule">Skype</a>. </li></ul><p>\r\n To learn more about Kinect, for Xbox 360, see\r\n <a target="_self" class="mscom-link" href="https://privacy.microsoft.com/kinect-and-xbox-360-privacy">Kinect and Xbox 360 privacy</a>. For Xbox One, see\r\n <a target="_self" class="mscom-link" href="https://privacy.microsoft.com/kinect-and-xbox-one-privacy">Kinect and Xbox One Privacy</a>.\r\n</p><p><strong>Captioning.</strong> During Xbox real-time chat, players may activate a voice-to-text feature, which allows the user to view the audio in-game chat as text. If a user activates this feature, the other players will have no additional notice. Microsoft uses this data to provide captioning of chat for users who need it. We also use this data to improve our ability to provide the service and other, similar voice-based services.</p><p><strong>Communications\xa0monitoring.</strong> Xbox Live includes communications features such as text-based messaging and online voice chat between players during gameplay. In order to help provide a safe gaming environment and enforce the\r\n <a target="_blank" class="mscom-link" href="https://www.xbox.com/legal/codeofconduct">Microsoft Code of Conduct</a>, we will collect, review, and monitor a sample of these communications, including Xbox Live game chats and party chat communications in live-hosted multiplayer gameplay sessions offered through the services.\r\n</p><p><strong>Voice data for service improvement. </strong>We collect, and use for service improvement, voice search requests or samples of voice commands\xa0occurring while using Kinect.\xa0These data are stored separately from your Xbox profile.\r\n</p><p><strong>GameDVR.</strong> Any player in a multiplayer game session can use GameDVR to record their view of the gameplay taking place in that session. The recording can capture your in-game character and gamertag in the game clips created by other players in the gameplay session. Note that if a player uses GameDVR on a PC, audio chat may also be captured in a game clip. Microsoft can review game clips for violations of the\r\n <a target="_blank" class="mscom-link" href="https://www.xbox.com/legal/codeofconduct">Microsoft Code of Conduct</a>, even if your game clip sharing setting is set to Block.\r\n</p><p><strong>Xbox Live Rewards.</strong> Xbox Live Rewards, available at\r\n <a target="_blank" class="mscom-link" title="rewards.xbox.com" href="https://rewards.xbox.com/">rewards.xbox.com</a>, is a program you can join to receive Xbox credits for being active on the services. You must agree to receive promotional communications from the Rewards program as a condition of joining. You sign into Rewards using your Microsoft account, and the program collects personal data including first name, last name, gamertag, and demographic information. The program is hosted and operated by HelloWorld, a Microsoft vendor. The data collected is stored by the vendor on behalf of Microsoft. You can review and edit the personal data you provided to the Rewards program by contacting\r\n <a target="_blank" class="mscom-link" href="mailto:privacy@helloworld.com">privacy@helloworld.com</a>.\r\n</p><p><strong>Children and online safety. </strong>If you have children who use Xbox services, you can set up child accounts for them. Children 17 and younger cannot create an account on Xbox Live without parental consent. Adults in the family can change consent choices and online safety settings for child accounts on\r\n <a target="_blank" class="mscom-link" href="https://www.xbox.com/">xbox.com</a>.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Enterprise Products</span><span id="navigationHeader">Enterprise Products</span><span id="moduleName">mainenterpriseservicesmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Enterprise Products are those Microsoft products and related offerings that are offered or designed primarily for use by organizations and developers. They include subscription cloud services, such as Office 365, Microsoft Azure, Microsoft Dynamics CRM Online, Microsoft Intune, and Yammer, for which an organization (our "customer") contracts with Microsoft for the services (\u201cOnline Services\u201d). They also include server and developer products customers run on their own premises, such as Windows Server, SQL Server, Visual Studio, and System Center (\u201cOn-Prem Products\u201d). Microsoft Cognitive Services are not Enterprise Products under this privacy statement.</p><p>Some Enterprise Products have their own, separate privacy statements. The following notices explain specific privacy practices with respect to certain Microsoft products you may use:</p><ul><li><a target="_self" class="mscom-link" href="https://go.microsoft.com/fwlink/p/?linkid=824704">Enterprise and developer</a></li><li><a target="_self" class="mscom-link" href="https://go.microsoft.com/fwlink/p/?LinkId=512132">Online services</a></li></ul><p><strong>In the event of a conflict between a Microsoft privacy statement the terms of any agreement(s) between a customer and Microsoft, the terms of those agreement(s) will control.</strong></p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>Enterprise Products are those Microsoft products and related offerings that are offered or designed primarily for use by organizations and developers. They include subscription cloud services, such as Office 365, Microsoft Azure, Microsoft Dynamics CRM Online, Microsoft Intune, and Yammer, for which an organization (our "customer") contracts with Microsoft for the services (\u201cOnline Services\u201d). They also include server and developer products customers run on their own premises, such as Windows Server, SQL Server, Visual Studio, and System Center (\u201cOn-Prem Products\u201d). Microsoft Cognitive Services are not Enterprise Products under this privacy statement.</p><p>Some Enterprise Products have their own, separate privacy statements. The following notices explain specific privacy practices with respect to certain Microsoft products you may use:</p><ul><li><a target="_self" class="mscom-link" href="https://go.microsoft.com/fwlink/p/?linkid=824704">Enterprise and developer</a></li><li><a target="_self" class="mscom-link" href="https://go.microsoft.com/fwlink/p/?LinkId=512132">Online services</a></li></ul><p><strong>In the event of a conflict between a Microsoft privacy statement the terms of any agreement(s) between a customer and Microsoft, the terms of those agreement(s) will control.</strong></p><p>When a customer purchases or subscribes to Enterprise Products, or obtains support for such products, Microsoft collects data to provide the best experiences with our products, operate our business, and communicate with the customer. For example:</p><ul><li>When a customer engages with a Microsoft sales representative, we collect the customer\u2019s name and contact data, along with information about the organization, to support that engagement.</li><li>When a customer interacts with a Microsoft support professional, we collect support data or error reports to diagnose and resolve problems.</li><li>When a customer pays for products, we collect contact and payment data to process the payment.</li><li>When a customer receives communications for Microsoft, we use data to personalize the content of the communication.</li></ul><p>Our customers, in turn, may administer the Enterprise Products to end users. If you use a work or school account (i.e. an email address provided by your organization, such as your employer or school) to sign into Enterprise Products, the owner of the domain associated with your email address may: (i) control and administer your account and (ii) access and process your data, including the contents of your communications and files. Microsoft is not responsible for the privacy or security policies or practices of our customers, which may differ from those of Microsoft. If your organization is administering your use of the Enterprise Products, please direct your privacy inquiries to your administrator.</p><p><strong>Online Services</strong>. The Online Services collect Customer Data and Administrator Data. "Customer Data" means all data, including all text, sound, video, or image files, and software, that are provided to Microsoft by, or on behalf of, you or your end users through use of the Online Service. Customer Data is used only to provide the customer the Online Services including purposes compatible with providing those services. For example, we may use Customer Data to provide a personalized experience, improve service reliability, combat spam or other malware, or improve features and functionality of the Online Services. Microsoft will not use Customer Data or derive information from it for any advertising or similar commercial purposes. For more information about the features and functionality that enable you to control Customer Data, please review documentation specific to the Online Service. To learn more about Microsoft\u2019s handling of Customer Data, including information about how we handle data access requests and security, please see\r\n <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/p/?LinkId=512132">Microsoft Online Services Terms</a>.</p><p>\u201cAdministrator Data\u201d is data provided to Microsoft during sign-up, purchase, or administration of the Online Services. Administrator Data includes the name, address, phone number, and email address you provide, as well as aggregated usage data related to your account, such as the controls you select. We use Administrator Data to provide the Online Services, complete transactions, service the account, and detect and prevent fraud. Administrator Data may also include contact information of your colleagues and friends if you agree to provide it to Microsoft for the limited purpose of sending them an invitation to use the Online Services; we may contact those individuals with communications that may include information about you, such as your name and profile photo.</p><p>As needed, we use Administrator Data to contact you to provide information about your account, subscriptions, billing, and updates to the Online Services, including information about new features, security or other technical issues. We may also contact you regarding third-party inquiries we receive regarding use of the Online Services, as described in your agreement. You will not be able to unsubscribe from these non-promotional communications. Subject to your contact preferences, we may also contact you regarding information and offers about other products and services, or share your contact information with Microsoft\'s partners. You may manage your contact preferences or update your information in your account profile.</p><p>When you use social features of the Online Services, other users in your network may see some of your activity. To learn more about the social features and other functionality, please review documentation specific to the Online Service.</p><p>The Online Services enable you to purchase, subscribe to or use other Microsoft products. Please be sure to read the product-specific details for each product you use to understand how each products\u2019 privacy practices may differ.</p><p><strong>On-Prem Products</strong>. On-Prem Products collect data to operate effectively and provide you the best experiences. The data we collect depends on the features you use, but it is generally limited to usage data. Customers have choices about the data they provide. For example:</p><ul><li>During installation or when you upgrade an On-Prem Product, we may collect use and performance data to learn whether you experience any difficulties.</li><li>When you use On-Prem Products, we may collect device data to learn about your operating environment to improve security features.</li><li>When you experience a crash, you may choose to send Microsoft an error report to help us diagnose the problem and deliver customer support.</li></ul><p>Microsoft uses the data we collect from On-Prem Products to provide and improve our products, to deliver customer support, to activate the product, to communicate with you, and to operate our business.</p></span></div></div><div class="displayNone" id="dvGroupModules"><span id="spn_mainotherimportantprivacyinformationmodule">\r\n mainsecurityofpersonaldatamodule,mainwherewestoreandprocessdatamodule,mainourretentionofpersonaldatamodule,maincollectionofdatafromchildrenmodule,mainpreviewreleasesmodule,mainchangestothisprivacystatementmodule,mainhowtocontactusmodule\r\n </span><span id="spn_mainmicrosofthealthservicesmodule">\r\n mainmicrosofthealthandbandmodule,mainhealthvaultmodule\r\n </span><span id="spn_mainwindowsmodule">\r\n mainactivationmodule,mainadvertisingidmodule, mainlocationservicesmotionsensingmodule,mainsecurityandsafetyfeaturesmodule, mainspeechinkingtypingmodule, mainsyncsettingsmodule,maintelemetryerrorreportingmodule,mainupdateservicesmodule, mainwebbrowsersmodule,mainwi-fisensemodule,mainwindowsappsmodule, mainwindowshellomodule,mainwindowssearchmodule\r\n </span></div><div class="displayNone" id="dvServicesAgreement">mainbingmodule</div></div><div class="row show-s hide-m"><div class="col-1-2"><div class="gcc_cookies m-b-lg"><div class="gcc_cookiesHeadergb caption-2"><span id="gcc_cookiesHeaderText">Cookies</span></div><div class="gcc_cookiesContent caption"><p>Most Microsoft Sites use "cookies," small text files that can be read by a web server in the domain that put the cookie on your hard drive. We may use cookies to store your preferences and settings; help with sign-in; provide targeted ads; and analyze site operations. <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">Click here to learn more.</a></p></div></div></div><div class="col-1-2"><div class="logo_relatedLink_S ection caption m-t-lg m-b-lg"><p><a title="FTC Privacy Initiatives" class="relatedLinks" id="MorePrivacyLink2" href="http://www.consumer.ftc.gov/topics/privacy-identity" target="_blank">Privacy Tips from the FTC</a></p></div><div class="gcl_safelogo m-b-lg"><div class="selfCertify caption m-b-md"><a id="psp_we_self_certify_compliance_with_small_screen" href="https://safeharbor.export.gov/list.aspx" target="_blank"></a></div><a href="http://export.gov/safeharbor/" target="_blank"><img src="https://c.s-microsoft.com/en-us/CMSImages/SafeHarbor.png?version=82204c88-ced3-50a2-eae5-11ff5aef0edd" class="mscom-image" alt="safeharbo" title="safeharbor" width="153" height="60"></a></div></div></div></div></div></div></div></div>'} 2017-02-26 16:56:18 [scrapy] DEBUG: Scraped from <200 https://privacy.microsoft.com/en-us/privacystatement> {'content': u'<div class="grid"><div class="row m-b-xl"><div class="col-1-1"><div class="row"><div class="l-col-10-12 xl-col-20-24"><h1>Microsoft Privacy Statement</h1><div class="Lastupdated"><span id="psp_last_updated">Last Updated:</span><span class="body-tight-2" id="psp_last_updated"> February 2017</span><span class="m-l-md"><a target="_blank" class="mscom-link" title="what\'s new" href="https://go.microsoft.com/fwlink/p/?LinkId=780766">\r\n What\'s new?\r\n </a></span></div></div><div class="l-col-2-12 xl-col-4-24"><div class="expand_collapse m-t-xl"><a id="expand_all_icon" style="color: black; text-decoration: none; display: inline-block;" href="#"><i class="icon-chevron-down m-r-md"></i></a><a title="Expand All" id="psp_expand_all" style="display: inline;" href="#">Expand All</a><a id="collapse_all_icon" style="color: black; text-decoration: none; display: none;" href="#"><i class="icon-chevron-up m-r-md"></i></a><a title="Collapse All" id="psp_collapse_all" style="display: none;" href="#">Collapse All</a></div><div class="div_print m-b-md m-t-md"><a title="Print" href="javascript:void(0)"><img src="https://c.s-microsoft.com/en-us/CMSImages/print-icon.png?version=60ebb5de-511c-db20-3795-563c739c5e12" class="mscom-image" alt="print-icon" title="print-icon" width="16" height="16"></a><a title="Print" class="m-l-md" id="psp_print" href="javascript:void(0)">Print</a></div></div></div></div></div><div class="row"><div class="col-1-1"><div class="row header_content m-b-bl"><div class="xl-col-18-24"><div class="m-t-xl;m-b-bl"><span class="Description" id="ShortDescription" loc="true"><p>Your privacy is important to us. This privacy statement explains what personal data we collect from you and how we use it. We encourage you to read the summaries below and to click on "Learn More" if you\'d like more information on a particular topic.</p><p>The product-specific details sections provide additional information relevant to particular Microsoft products. This statement applies to the Microsoft products listed below, as well as other Microsoft products that display this statement. References to Microsoft products in this statement include Microsoft services, websites, apps, software and devices.</p></span></div><div class="m-t-xl" style="display: none;"><p>The most recent version of this privacy statement can be found at aka.ms/privacy.</p></div></div></div></div></div><div class="row"><div class="col-1-1"><div class="row full_content"><div class="nav_content xl-col-7-24 m-col-8-24 hide-xs show-m"><div id="menu_cookie_div"><div class="div_side_comp"></div><div class="gcc_cookies m-b-lg m-t-bl m-r-bl"><div class="gcc_cookiesHeadergb caption-2"><span id="gcc_cookiesHeaderText">Cookies</span></div><div class="gcc_cookiesContent caption"><p>Most Microsoft Sites use "cookies," small text files that can be read by a web server in the domain that put the cookie on your hard drive. We may use cookies to store your preferences and settings; help with sign-in; provide targeted ads; and analyze site operations. <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">Click here to learn more.</a></p></div></div><div class="gcc_cookies m-b-lg m-t-bl m-r-bl"><div class="gcc_cookiesHeadergb caption-2"><span id="gcc_cookiesHeaderText">EU-U.S. Privacy Shield</span></div><div class="gcc_cookiesContent caption"><p>Microsoft participates in the EU-U.S. Privacy Shield framework. To learn more, <a class="mscom-link" href="https://www.privacyshield.gov/welcome">Click here.</a></p></div></div><!--\r\n<div class="logo_relatedLink_Section caption m-t-lg m-b-bl">\r\n <p>\r\n <a title="FTC Privacy Initiatives" class="relatedLinks" id="MorePrivacyLink2" href="http://www.consumer.ftc.gov/topics/privacy-identity" target="_blank">Privacy Tips from the FTC</a>\r\n </p>\r\n</div>\r\n--><!--<div class="gcl_safelogo"><div class="selfCertify caption m-b-md">\r\n <a id="psp_we_self_certify_compliance_with" href="https://safeharbor.export.gov/list.aspx" target="_blank"></a>\r\n </div><a href="http://export.gov/safeharbor/" target="_blank"><mscom:image title="safeharbor" instancename="safeharbor" controltheme="default" md:payloadguid="46d04be5-e74a-4b41-ad79-1e3d2a298ca7" alt="safeharbo" usedatasource="false" noheightwidth="false" sprite="false" spritegroup="default"></mscom:image></a></div>--></div></div><div class="body_content m-col-16-24 xl-col-12-24"><div class="div_content"><div id="divModuleDescriptionList"><div class="divModuleDescription"><br><span id="Header">Personal Data We Collect</span><span id="navigationHeader">Personal Data We Collect</span><span id="moduleName">mainpersonaldatawecollect</span><div class="printsummary" style="display: block;">\r\n Summary\r\n </div><span class="Description" id="ShortDescription"><span><p>Microsoft collects data to operate effectively and provide you the best experiences with our products. You provide some of this data directly, such as when you create a Microsoft account, submit a search query to Bing, speak a voice command to Cortana, upload a document to OneDrive, purchase an MSDN subscription, sign up for Office 365, or contact us for support. We get some of it by recording how you interact with our products by, for example, using technologies like <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">cookies</a>, and receiving error reports or usage data from software running on your device. We also obtain data from third parties.</p></span></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>Microsoft collects data to operate effectively and provide you the best experiences with our products. You provide some of this data directly, such as when you create a Microsoft account, submit a search query to Bing, speak a voice command to Cortana, upload a document to OneDrive, purchase an MSDN subscription, sign up for Office 365, or contact us for support. We get some of it by recording how you interact with our products by, for example, using technologies like\r\n <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">cookies</a>, and receiving error reports or usage data from software running on your device.</p><p>We also obtain data from third parties. For example, we supplement the data we collect by purchasing demographic data from other companies. We also use services from other companies to help us determine a location based on your IP address in order to customize certain products to your location.</p><p>You have choices about the data we collect. When you are asked to provide personal data, you may decline. But if you choose not to provide data that is necessary to provide a product or feature, you may not be able to use that product or feature.</p><p>The data we collect depends on the products and features you use, and can include the following:</p><p><strong>Name and contact data</strong>. We collect your first and last name, email address, postal address, phone number, and other similar contact data.\r\n</p><p><strong>Credentials</strong>. We collect passwords, password hints, and similar security information used for authentication and account access.</p><p><strong>Demographic data</strong>. We collect data about you such as your age, gender, country, and preferred language.</p><p><strong>Payment data</strong>. We collect data necessary to process your payment if you make purchases, such as your payment instrument number (such as a credit card number), and the security code associated with your payment instrument.</p><p><strong>Usage data</strong>. We collect data about how you and your device interact with Microsoft and our products. For example, we collect:</p><ul><li><em>Product use data</em>. We collect data about the features you use, the items you purchase, and the web pages you visit. This data includes your voice and text search queries or commands to Bing, Cortana, and our chat bots.</li><li><em>Device data</em>. We collect data about your device and the network you use to connect to our products. It includes data about the operating systems and other software installed on your device, including product keys. It also includes IP address, device identifiers (such as the IMEI number for phones), regional and language settings.</li><li><em>Error reports and performance data</em>. We collect data about the performance of the products and any problems you experience with them. This data helps us to diagnose problems in the products you use, and to improve our products and provide solutions. Depending on your product and settings, error reports can include data such as the type or severity of the problem, details of the software or hardware related to an error, contents of files you were using when an error occurred, and data about other software on your device.</li><li><em>Support Data</em>. When you engage Microsoft for support, we collect data about you and your hardware, software, and other details related to the support incident. Such data includes contact or authentication data, the content of your chats and other communications with Microsoft support, data about the condition of the machine and the application when the fault occurred and during diagnostics, and system and registry data about software installations and hardware configurations.</li></ul><p><strong>Interests and favorites</strong>. We collect data about your interests and favorites, such as the teams you follow in a sports app, the stocks you track in a finance app, or the favorite cities you add to a weather app. In addition to those you explicitly provide, your interests and favorites may also be inferred or derived from other data we collect.</p><p><strong>Contacts and relationships</strong>. We collect data about your contacts and relationships if you use a Microsoft product to manage contacts, or to communicate or interact with other people or organizations.</p><p><strong>Location data</strong>. We collect data about your location, which can be either precise or imprecise. Precise location data can be Global Position System (GPS) data, as well as data identifying nearby cell towers and Wi-Fi hotspots, we collect when you enable location-based products or features. Imprecise location data includes, for example, a location derived from your IP address or data that indicates where you are located with less precision, such as at a city or postal code level.</p><p><strong>Content</strong>. We collect content of your files and communications when necessary to provide you with the products you use. For example, if you receive an email using Outlook.com or Exchange Online, we need to collect the content of that email to deliver it to your inbox, display it to you, enable you to reply to it, and store it for you until you choose to delete it. Examples of this data include: the content of your documents, photos, music, or videos you upload to a Microsoft service such as OneDrive, as well as the content of your communications sent or received using Microsoft products such Outlook.com or Skype, including the:</p><ul><li>subject line and body of an email,</li><li>text or other content of an instant message,</li><li>audio and video recording of a video message, and</li><li>audio recording and transcript of a voice message you receive or a text message you dictate.</li></ul><p>We also collect the content of messages you send to us, such as feedback and product reviews you write, or questions and information you provide for customer support. When you contact us, such as for customer support, phone conversations or chat sessions with our representatives may be monitored and recorded. If you enter our retail stores or other facilities, your image may be captured by our security cameras.</p><p>Product-specific sections below describe data collection practices applicable to use of those products.</p></span></div><div class="divModuleDescription"><span id="Header">How We Use Personal Data</span><span id="navigationHeader">How We Use Personal Data</span><span id="moduleName">mainhowweusepersonaldatamodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Microsoft uses the data we collect to provide you the products we offer, which includes using data to improve and personalize your experiences. We also may use the data to communicate with you, for example, informing you about your account, security updates and product information. And we use data to help show more relevant ads, whether in our own products like MSN and Bing, or in products offered by third parties. However, we do not use what you say in email, chat, video calls or voice mail, or your documents, photos or other personal files to target ads to you.</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>Microsoft uses the data we collect to provide you the products we offer, which includes using data to improve and personalize your experiences. We also may use the data to communicate with you, for example, informing you about your account, security updates and product information. And we use data to help show more relevant ads, whether in our own products like MSN and Bing, or in products offered by third parties. However, we do not use what you say in email, chat, video calls or voice mail, or your documents, photos or other personal files to target ads to you.</p><p>\r\n Microsoft uses the data we collect for three basic purposes, described in more detail below: (1) to operate our business and provide (including improving and personalizing) the products we offer, (2) to send communications, including promotional communications, and (3) for some products, to show advertising.\r\n</p><p>\r\n In carrying out these purposes, we combine data we collect to give you a more seamless, consistent and personalized experience. For example,\r\n <a class="mscom-link" href="#maincortanamodule">Cortana</a> can use the favorite sports teams you add to the\r\n <a class="mscom-link" href="#mainmainmodule">MSN</a> Sports app to provide information relevant to your interests, or\r\n <a id="mainwindowsstoremodulefromHowWeUsePersonalData" class="mscom-link" href="#mainwindowsstoremodule">Windows Store</a> can use information about the apps and services you use to make personalized app recommendations. However, to enhance privacy, we have built in technological and procedural safeguards designed to prevent certain data combinations. For example, we store data we collect from you when you are unauthenticated (not signed in) separately from any account information that directly identifies you, such as your name, email address or phone number.\r\n</p><p><strong>Providing and improving our products</strong>. We use data to provide and improve the products we offer and perform essential business operations. This includes operating the products, maintaining and improving the performance of the products, including developing new features, research, and providing customer support. Examples of such uses include the following.\r\n</p><ul><li><strong>Providing the Products</strong>. We use data to carry out your transactions with us and to provide our products to you. Often, those products include personalized features and recommendations that enhance your productivity and enjoyment, and tailor your product experiences based on your activities, interests and location.\r\n </li><li><strong>Customer support</strong>. We use data to diagnose product problems, repair customers\' devices, and provide other customer care and support services.\r\n </li><li><strong>Product activation</strong>. We use data - including device and application type, location, and unique device, application, network and subscription identifiers - to activate software and devices that require activation.\r\n </li><li><strong>Product Improvement</strong>. We use data to continually improve our products, including adding new features or capabilities, such as using error reports to improve security features, using search queries and clicks in Bing to improve the relevancy of the search results, using usage data to determine what new features to prioritize, or using audio recordings from voice input features to improve speech recognition accuracy.\r\n </li><li><strong>Security, Safety and Dispute Resolution</strong>. We use data to protect the security and safety of our products and our customers, to detect and prevent fraud, to confirm the validity of software licenses, to resolve disputes and enforce our agreements. Our security features and products can disrupt the operation of malicious software and notify users if malicious software is found on their devices. For example, many of our communications and file syncing products systematically scan content in an automated manner to identify suspected spam, viruses, abusive actions, or URLs that have been flagged as fraud, phishing or malware links; and we may block delivery of a communication or remove content if it violates our terms.\r\n </li><li><strong>Business Operations</strong>. We use data to develop aggregate analysis and business intelligence that enable us to operate, protect, make informed decisions, and report on the performance of our business.\r\n </li></ul><p><strong>Communications</strong>. We use data we collect to deliver and personalize our communications with you. For example, we may contact you by email or other means to inform you when a subscription is ending, let you know when security updates are available, remind you about items left in your online shopping cart, update you or inquire about a service or repair request, invite you to participate in a survey, or tell you that you need to take action to keep your account active. Additionally, you can sign up for email subscriptions and choose whether you wish to receive promotional communications from Microsoft by email, SMS, physical mail, and telephone. For information about managing email subscriptions and promotional communications, please visit the\r\n <a class="mscom-link" href="#mainhowtoaccesscontrolyourdatamodule">Access and Controls</a> section of this privacy statement.\r\n</p><p><strong>Advertising</strong>. Many of our products are supported by advertising. We share data we collect with third parties such as AOL and AppNexus so that they can select and deliver some of the ads you see on our sites and apps, as well as other sites and apps serviced by these partners. The ads that you see may be selected based on your current location, search query, or the content you are viewing. Other ads are targeted based on your likely interests or other information learned about you over time using demographic data, search queries, interests and favorites, usage data from our own sites and apps and the sites and apps of our advertisers and partners, and location data - which we refer to as "interest-based advertising" in this statement. To provide interest-based advertising, we combine cookies placed on your device using information that we collect (such as IP address) when your browser interacts with our websites. If you opt out of receiving interest-based advertising, data associated with these cookies will not be used. Microsoft does not use what you say in email, chat, video calls or voice mail, or your documents, photos or other personal files to target ads to you. <strong>You can opt out of receiving interest-based advertising from Microsoft by visiting our <a target="_blank" class="mscom-link" href="http://go.microsoft.com/fwlink/?LinkID=286759">opt-out page</a></strong>. More information about advertising controls is available in the\r\n <a class="mscom-link" href="#mainhowtoaccesscontrolyourdatamodule">Access and Controls</a> section of this privacy statement. Further details regarding our advertising-related uses of data include:\r\n</p><ul><li><strong>Advertising Industry Best Practices and Commitments</strong>. Microsoft is a member of the\r\n <a target="_blank" class="mscom-link" href="http://www.networkadvertising.org/">Network Advertising Initiative</a> (NAI) and adheres to the NAI Code of Conduct. We also adhere to the following self-regulatory programs:\r\n\r\n <ul><li>In the US:\r\n <a target="_blank" class="mscom-link" href="http://go.microsoft.com/fwlink/?LinkId=304134">Digital Advertising Alliance (DAA)</a></li><li>In Europe:\r\n <a target="_blank" class="mscom-link" href="http://www.youronlinechoices.com/">European Interactive Digital Advertising Alliance (EDAA)</a></li><li>In Canada:\r\n <a target="_blank" class="mscom-link" href="http://www.youradchoices.ca/">Ad Choices: Digital Advertising Alliance of Canada (DAAC)</a> /\r\n <a target="_blank" class="mscom-link" href="http://www.youradchoices.ca/fr">Choix de Pub: l\'Alliance de la publicit\xe9 num\xe9rique du Canada (DAAC)</a></li></ul></li><li><strong>Health-Related Ad Targeting</strong>. In the United States, we provide interest-based advertising based on a limited number of standard, non-sensitive health-related interest categories, including allergies, arthritis, cholesterol, cold and flu, diabetes, gastrointestinal health, headache / migraine, healthy eating, healthy heart, men\u2019s health, oral health, osteoporosis, skin health, sleep, and vision / eye care. We will also target ads based on custom, non-sensitive health-related interest categories as requested by advertisers.\r\n </li><li><strong>Children and Advertising</strong>. We do not deliver interest-based advertising to children whose birthdate in their Microsoft account identifies them as under 13 years of age.\r\n </li><li><strong>Data Retention</strong>. For interest-based advertising, we retain data for no more than 13 months, unless we obtain your consent to retain the data longer.\r\n </li><li><strong>Data Sharing</strong>. In some cases, we share with advertisers reports about the data we have collected on their sites or ads. Advertisers may choose to place our\r\n <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">web beacons</a>\xa0on their sites in order to allow Microsoft to collect information on their sites such as activities, purchases and visits; we use this data on behalf of our advertising customers to help target their ads. We also share data directly with service providers (such as AOL and AppNexus) to permit them to provide services on our behalf or to partner with us in selecting and serving ads for our advertising partners.\r\n </li><li><strong>Data Collected by Other Advertising Companies</strong>. Advertisers sometimes include their own\r\n <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">web beacons</a> (or those of their other advertising partners) within their advertisements that we display, enabling them to set and read their own\r\n <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">cookie</a>. Additionally, Microsoft partners with third-party ad companies to help provide some of our advertising services, and we also allow other third-party ad companies to display advertisements on our sites. These third parties may place cookies on your computer and collect data about your online activities across websites or online services. These companies currently include, but are not limited to:\r\n <a target="_blank" class="mscom-link" href="http://www.a9.com/">A9</a>,\r\n <a target="_blank" class="mscom-link" href="http://advertising.aol.com/">AOL Advertising</a>,\r\n <a target="_blank" class="mscom-link" href="http://www.appnexus.com/">AppNexus</a>,\r\n <a target="_blank" class="mscom-link" href="http://www.criteo.com/">Criteo</a>,\r\n <a target="_blank" class="mscom-link" href="https://www.facebook.com/help/568137493302217">Facebook</a>,\r\n <a target="_blank" class="mscom-link" href="http://www.mediamath.com/">MediaMath</a>,\r\n <a target="_blank" class="mscom-link" href="http://ad-choices.nuggad.net/">nugg.adAG</a>,\r\n <a target="_blank" class="mscom-link" href="http://rocketfuel.com/">Rocket Fuel</a>,\r\n <a target="_blank" class="mscom-link" href="http://advertising.yahoo.com/">Yahoo!</a>. You may find more information on each company\'s practices, including the choices it offers, by clicking on the company names above. Many of them are also members of the\r\n <a target="_blank" class="mscom-link" href="http://www.networkadvertising.org/managing/opt_out.aspx">NAI</a> or\r\n <a target="_blank" class="mscom-link" href="http://www.aboutads.info/choices/">DAA</a>, which each provide a simple way to opt out of ad targeting from participating companies.\r\n </li></ul></span></div><div class="divModuleDescription"><span id="Header">Reasons We Share Personal Data</span><span id="navigationHeader">Reasons We Share Personal Data</span><span id="moduleName">mainreasonswesharepersonaldatamodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\nWe share your personal data with your consent or as necessary to complete any transaction or provide any product you have requested or authorized. We also share data with Microsoft-controlled affiliates and subsidiaries; with vendors working on our behalf; when required by law or to respond to legal process; to protect our customers; to protect lives; to maintain the security of our products; and to protect the rights or property of Microsoft.\r\n</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>\r\n We share your personal data with your consent or as necessary to complete any transaction or provide any product you have requested or authorized. For example, we share your content with third parties when you tell us to do so, such as when you send an email to a friend, share photos and documents on OneDrive, or link accounts with another service. When you provide payment data to make a purchase, we will share payment data with banks and other entities that process payment transactions or provide other financial services, and for fraud prevention and credit risk reduction. \r\n</p><p>\r\n In addition, we share personal data among Microsoft-controlled affiliates and subsidiaries. We also share personal data with vendors or agents working on our behalf for the purposes described in this statement. For example, companies we\'ve hired to provide customer service support or assist in protecting and securing our systems and services may need access to personal data in order to provide those functions. In such cases, these companies must abide by our data privacy and security requirements and are not allowed to use personal data they receive from us for any other purpose. We may also disclose personal data as part of a corporate transaction such as a merger or sale of assets.\r\n</p><p>\r\n Finally, we will access, transfer, disclose, and preserve personal data, including your content (such as the content of your emails in Outlook.com, or files in private folders on OneDrive), when we have a good faith belief that doing so is necessary to: \r\n</p><ol><li>comply with applicable law or respond to valid legal process, including from law enforcement or other government agencies; </li><li>protect our customers, for example to prevent spam or attempts to defraud users of our products, or to help prevent the loss of life or serious injury of anyone; </li><li>operate and maintain the security of our products, including to prevent or stop an attack on our computer systems or networks; or </li><li>protect the rights or property of Microsoft, including enforcing the terms governing the use of the services - however, if we receive information indicating that someone is using our services to traffic in stolen intellectual or physical property of Microsoft, we will not inspect a customer\'s private content ourselves, but we may refer the matter to law enforcement. </li></ol><p>\r\n For more information about data we disclose in response to requests from law enforcement and other government agencies, please see our Law Enforcement Transparency Report, available at <a target="_blank" class="mscom-link" href="https://microsoft.com/about/corporatecitizenship/en-us/reporting/transparency">microsoft.com/about/corporatecitizenship/en-us/reporting/transparency</a>.\r\n</p><p>\r\n Please note that some of our products include links to products of third parties whose privacy practices differ from Microsoft\'s. If you provide personal data to any of those products, your data is governed by their privacy statements.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">How to Access &amp; Control Your Personal Data</span><span id="navigationHeader">How to Access &amp; Control Your Personal Data</span><span id="moduleName">mainhowtoaccesscontrolyourdatamodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>You can view or edit your personal data online for many Microsoft products. You can also make choices about Microsoft\'s collection and use of your data. How you can access or control your personal data will depend on which products you use.</p><p>You can always choose whether you wish to receive promotional email, SMS messages, telephone calls and postal mail from Microsoft. You can also opt out from receiving interest-based advertising from Microsoft by visiting our <a target="_blank" class="mscom-link" href="http://go.microsoft.com/fwlink/?LinkID=286759">opt-out page</a>.\r\n</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription" loc="true"><p></p><p>\r\n You can view or edit your personal data online for many Microsoft products. You can also make choices about Microsoft\'s collection and use of your data. How you can access or control your personal data will depend on which products you use. For example:\r\n</p><ul><li><strong>Microsoft account</strong>. If you wish to access or edit the profile information and payment information in your\r\n <a class="mscom-link" href="#mainmicrosoftaccountmodule">Microsoft account</a>, change your password, add security information or close your account, you can do so by visiting\r\n <a target="_blank" class="mscom-link" href="https://account.microsoft.com">account.microsoft.com</a>. From here, you can also access controls for other Microsoft products.</li><li><strong>Bing and Cortana</strong>. You can access or clear your Bing search history, redeem Bing Rewards, view and modify interests, and manage other Cortana data at\r\n <a target="_blank" class="mscom-link" href="https://www.bing.com/account/general">www.bing.com/account/general</a>. <strong></strong></li><li><strong>Skype</strong>. If you wish to access or edit the profile information and payment information in your Skype account or change your password, you can sign into your account at\r\n <a target="_blank" class="mscom-link" href="https://login.skype.com/login">login.skype.com/login</a>. </li><li><strong>Xbox</strong>. If you use Xbox Live or Xbox.com, you can view or edit your personal data, including billing and account information, privacy settings, online safety and data sharing preferences by accessing\r\n <a target="_blank" class="mscom-link" href="http://live.xbox.com/MyXbox/Profile">My Xbox</a> on the Xbox console or on the Xbox.com website. </li><li><strong>Microsoft Store</strong>. You can access your Microsoft Store profile and account information by visiting\r\n <a target="_blank" class="mscom-link" href="https://www.microsoftstore.com/">www.microsoftstore.com/</a> and clicking on "View account" or "Order history." </li><li><strong>Microsoft.com</strong>. You can access and update your profile on microsoft.com by visiting the\r\n <a target="_blank" class="mscom-link" href="https://go.microsoft.com/?linkid=317027">Microsoft.com Profile Center</a>. If you have a Microsoft Developer Network public profile, you can access and edit it at\r\n <a target="_blank" class="mscom-link" href="https://connect.microsoft.com/profile.aspx">connect.microsoft.com/profile.a spx</a>.\r\n </li></ul><p>\r\n If you cannot access certain personal data collected by Microsoft via the links above or directly through the Microsoft products you use, you can always contact Microsoft by using our\r\n <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/?LinkId=321116">web form</a>. We will respond to requests to access or delete your personal data within 30 days.\r\n</p><p><strong>Your Communications Preferences</strong></p><p>\r\n You can choose whether you wish to receive promotional communications from Microsoft by email, SMS, physical mail, and telephone. If you receive promotional email or SMS messages from us and would like to opt out, you can do so by following the directions in that message. You can also make choices about the receipt of promotional email, telephone calls, and postal mail by signing in with your personal\r\n <a class="mscom-link" href="#mainmicrosoftaccountmodule">Microsoft account</a>, and viewing your <a class="mscom-link" href="https://go.microsoft.com/fwlink/?LinkId=243191">communication permissions</a> where you can update contact information, manage Microsoft-wide contact preferences, opt out of email subscriptions, and choose whether to share your contact information with Microsoft partners. If you do not have a personal Microsoft account, you can manage your Microsoft email contact preferences by using this <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/?LinkId=243189">web form</a>. These choices do not apply to mandatory service communications that are part of certain Microsoft services, or to surveys or other informational communications that have their own unsubscribe method.\r\n</p><p><strong>Your Advertising Choices</strong></p><p>\r\n You may opt out of receiving interest-based advertising from Microsoft by visiting our\r\n <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/?LinkID=286759">opt-out page</a>. When you opt out, your selection will be stored in a\r\n <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">cookie</a> that is specific to the web browser you are using. The opt-out cookie has an expiration date of five years. If you delete the cookies on your device, you will need to opt out again.\r\n</p><p>You can also link your opt-out choice with your personal Microsoft account. It will then apply on any device where you use\xa0that account, and will continue to apply until someone signs in with a different personal Microsoft account on that device. If you delete the cookies on your device, you will need to sign in again for the settings to apply.</p><p>\r\n For advertising that appears in apps on Windows, you may use the opt-out linked to your personal Microsoft account, or opt out of interest-based advertising by turning off the\r\n <a id="mainadvertisingidmodulefromHowtoAccess" class="mscom-link" href="#mainadvertisingidmodule">advertising ID</a> in Windows Settings.\r\n</p><p>\r\n Because the data used for interest-based advertising is also used for other necessary purposes (including providing our products, analytics and fraud detection), opting out of interest-based advertising does not stop that data from being collected. Nor does it mean you will stop getting ads or see fewer ads. However, if you do opt out, the ads you receive will no longer be interest-based and may be less relevant to your interests.\r\n</p><p><strong>Browser-Based Controls</strong></p><ul><li><strong>Cookie Controls</strong>. Relevant browser-based cookie controls are described in the\r\n <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">Cookies</a> section of this privacy statement.\r\n </li><li><strong>Tracking Protection</strong>. Internet Explorer (versions 9 and up) has a feature called Tracking Protection that will block third-party content, including cookies, from any site that is listed in a Tracking Protection List you add. By limiting calls to these sites, the browser will limit the information these third-party sites can collect about you.\r\n </li><li><strong>Browser Controls for "Do Not Track."</strong> Some browsers have incorporated "Do Not Track" (DNT) features that can send a signal to the websites you visit indicating you do not wish to be tracked. Because there is not yet a common understanding of how to interpret the DNT signal, Microsoft services do not currently respond to browser DNT signals. We continue to work with the online industry to define a common understanding of how to treat DNT signals. In the meantime, you can use the range of other tools we provide to control data collection and use, including the ability to opt out of receiving interest-based advertising from Microsoft as described above.\r\n </li></ul></span></div><div class="divModuleDescription"><span id="Header">Cookies &amp; Similar Technologies</span><span id="navigationHeader">Cookies &amp; Similar Technologies</span><span id="moduleName">maincookiessimilartechnologiesmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Microsoft uses cookies (small text files placed on your device) and similar technologies to provide our websites and online services and help collect data. Cookies allow us, among other things, to store your preferences and settings; enable you to sign-in; provide interest-based advertising; combat fraud; and analyze how our websites and online services are performing. Microsoft apps use other identifiers, such as the advertising ID in Windows, for similar purposes. \r\n</p><p>We also use web beacons to help deliver cookies and gather usage and performance data. Our websites may include web beacons and cookies from third-party service providers. \t\r\n</p><p>You have a variety of tools to control cookies, web beacons and similar technologies, including browser controls to block and delete cookies and controls from some third-party analytics service providers to opt out of data collection through web beacons. Your browser and other choices may impact your experiences with our products.\r\n</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription" loc="true"><p>\r\n Microsoft uses cookies (small text files placed on your device) and similar technologies to provide our websites and online services and help collect data. The text in a cookie often consists of a string of numbers and letters that uniquely identifies your computer, but it can contain other information as well. Microsoft apps use other identifiers, such as the <a class="mscom-link" href="#mainadvertisingidmodule">advertising ID</a> in Windows, for similar purposes, and many of our websites and applications also contain web beacons or other similar technologies, as described below.\r\n</p><p><strong>Our Use of Cookies and Similar Technologies</strong></p><p>Microsoft uses cookies and similar technologies for several purposes, depending on the product, including:</p><ul style="list-style-type: disc;"><li><strong>Storing your Preferences and Settings</strong>. Settings that enable our products to operate correctly or that maintain your preferences over time may be stored on your device. For example, if you enter your city or postal code to get local news or weather information on a Microsoft website, we may store that data in a cookie so that you will see the relevant local information when you return to the site. If you opt out of interest-based advertising, we store your opt-out preference in a cookie on your device.</li><li><strong>Sign-in and Authentication</strong>. When you sign into a website using your personal <a class="mscom-link" href="#mainmicrosoftaccountmodule">Microsoft account</a>, we store a unique ID number, and the time you signed in, in an encrypted cookie on your device. This cookie allows you to move from page to page within the site without having to sign in again on each page. </li><li><strong>Interest-Based Advertising</strong>. Microsoft uses cookies to collect data about your online activity and identify your interests so that we can provide advertising that is most relevant to you. You can opt out of receiving interest-based advertising from Microsoft as described in the\xa0<a class="mscom-link" href="#mainhowtoaccesscontrolyourdatamodule">Access and Control</a>\xa0section of this privacy statement. </li><li><strong>Analytics</strong>. In order to provide our products, we use cookies and other identifiers to gather usage and performance data. For example, we use cookies to count the number of unique visitors to a web page or service and to develop other statistics about the operations of our products. </li></ul><p>\r\n Some of the cookies we commonly use are listed in the following chart. This list is not exhaustive, but it is intended to illustrate the main reasons we typically set cookies. If you visit one of our websites, the site may set some or all of the following cookies:\r\n</p><table border="1" cellpadding="5" cellspacing="5"><tbody><tr><td><strong>Cookie name</strong><strong></strong></td><td><strong>Description</strong></td></tr><tr><td><p>MUID</p></td><td><p>Identifies unique web browsers visiting Microsoft sites. It is used for advertising, site analytics and other operational purposes.</p></td></tr><tr><td><p>ANON</p></td><td><p>Contains the ANID, a unique identifier derived from your Microsoft account, which is used for advertising, personalization, and operational purposes. It is also used to preserve your choice to opt out of interest-based advertising from Microsoft, if you have chosen to associate the opt-out with your Microsoft account.</p></td></tr><tr><td><p>CC</p></td><td><p>Contains a country code as determined from your IP address.</p></td></tr><tr><td><p>RPSTAuth, MSNRPSAuth, KievRPSAuth</p></td><td><p>Helps to authenticate you when you sign in with your Microsoft account.</p></td></tr><tr><td><p>NAP</p></td><td><p>Contains an encrypted version of your country, postal code, age, gender, language and occupation, if known, based on your Microsoft account profile.</p></td></tr><tr><td><p>MH</p></td><td><p>Appears on co-branded sites where Microsoft is partnering with an advertiser. This cookie identifies the advertiser so the right ad is selected.</p></td></tr><tr><td><p>TOptOut</p></td><td><p>Records your decision not to receive interest-based advertising delivered by Microsoft.</p></td></tr></tbody></table><p>\r\n In addition to the cookies Microsoft sets when you visit our websites, third parties may also set cookies when you visit Microsoft sites. In some cases, that is because we have hired the third party to provide services on our behalf, such as site analytics. In other cases, it is because our web pages contain content or ads from third parties, such as videos, news content or ads delivered by other ad networks. Because your browser connects to those third parties\' web servers to retrieve that content, those third parties are able to set or read their own cookies on your device and may collect information about your online activities across websites or online services.\r\n</p><p><strong>How to Control Cookies</strong></p><p>\r\n Most web browsers automatically accept cookies but provide controls that allow you to block or delete them. For example, in Microsoft Edge, you can block or delete cookies by clicking <strong>Settings\xa0&gt; Privacy\xa0&gt; Cookies.</strong> Instructions for blocking or deleting cookies in other browsers may be available in each browser\'s privacy or help documentation.\r\n</p><p>\r\n Certain features of Microsoft products depend on cookies. Please be aware that if you choose to block cookies, you may not be able to sign in or use those features, and preferences that are dependent on cookies may be lost. If you choose to delete cookies, settings and preferences controlled by those cookies, including advertising preferences, will be deleted and may need to be recreated.\r\n</p><p>\r\n Additional privacy controls that can impact cookies, including the Tracking Protection feature of Microsoft browsers, are described in the\r\n <a class="mscom-link" href="#mainhowtoaccesscontrolyourdatamodule">Access and Control</a> section of this privacy statement.\r\n</p><p><strong>Our Use of Web Beacons and Analytics Services</strong></p><p>Microsoft web pages may contain electronic images known as web beacons (also called single-pixel gifs) that we use to help deliver cookies on our websites, count users who have visited those websites and deliver co-branded products. We also include web beacons in our promotional email messages or newsletters to determine whether you open and act on them. </p><p>In addition to placing web beacons on our own websites, we sometimes work with other companies to place our web beacons on their websites or in their advertisements. This helps us develop statistics on how often clicking on an advertisement on a Microsoft website results in a purchase or other action on the advertiser\'s website. </p><p>\r\n Finally, Microsoft products often contain web beacons or similar technologies from third-party analytics providers, which help us compile aggregated statistics about the effectiveness of our promotional campaigns or other operations. These technologies enable the analytics providers to set or read their own cookies or other identifiers on your device, through which they can collect information about your online activities across applications, websites or other products. However, we prohibit these analytics providers from using web beacons on our sites to collect or access information that directly identifies you (such as your name or email address). You can opt out of data collection or use by some of these analytics providers by clicking the following links:\r\n</p><ul><li>\r\n Flurry Analytics:\r\n <a target="_blank" class="mscom-link" href="https://dev.flurry.com/secure/optOut.do">dev.flurry.com/secure/optOut.do</a></li><li>\r\n Google Analytics:\r\n <a target="_blank" class="mscom-link" href="http://tools.google.com/dlpage/gaoptout">tools.google.com/dlpage/gaoptout</a> (requires you to install a browser add-on)\r\n </li><li>\r\n Kissmetrics:\r\n <a target="_blank" class="mscom-link" href="https://kissmetrics.com/user-privacy">kissmetrics.com/user-privacy</a></li><li>\r\n Mixpanel:\r\n <a target="_blank" class="mscom-link" href="https://mixpanel.com/optout">mixpanel.com/optout</a></li><li>\r\n Nielsen:\r\n <a target="_blank" class="mscom-link" href="http://www.nielsen-online.com/corp.jsp?section=leg_prs&amp;nav=1#Optoutchoices">www.nielsen-online.com/corp.jsp?section=leg_prs&amp;nav=1#Optoutchoices</a></li><li>\r\n Omniture (Adobe):\r\n <a target="_blank" class="mscom-link" href="http://www.d1.sc.omtrdc.net/optout.html">www.d1.sc.omtrdc.net/optout.html</a></li><li>\r\n Visible Measures:\r\n <a target="_blank" class="mscom-link" href="http://www.visiblemeasures.com/viewer-settings-opt-out">www.visiblemeasures.com/viewer-settings-opt-out</a></li><li>\r\n WebTrends:\r\n <a target="_blank" class="mscom-link" href="https://ondemand.webtrends.com/support/optout.asp">ondemand.webtrends.com/support/optout.asp</a></li></ul><strong>Other Similar Technologies</strong><p>\r\n In addition to standard cookies and web beacons, our products can also use other similar technologies to store and read data files on your computer. This is typically done to maintain your preferences or to improve speed and performance by storing certain files locally. But, like standard cookies, these technologies can also be used to store a unique identifier for your computer, which can then be used to track behavior. These technologies include Local Shared Objects (or "Flash cookies") and Silverlight Application Storage.\r\n</p><p><strong>Local Shared Objects or "Flash cookies."</strong> Web sites that use Adobe Flash technologies can use Local Shared Objects or "Flash cookies" to store data on your computer. To manage or block Flash cookies, go to\r\n <a target="_blank" class="mscom-link" href="http://www.macromedia.com/support/documentation/en/flashp layer/help/settings_manager.html">www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager.html</a>.\r\n</p><p><strong>Silverlight Application Storage.</strong> Web sites or applications that use Microsoft Silverlight technology also have the ability to store data by using Silverlight Application Storage. To learn how to manage or block such storage, see the\r\n <a class="mscom-link" href="#mainsilverlightmodule">Silverlight</a> section of this statement.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Microsoft account</span><span id="navigationHeader">Microsoft account</span><span id="moduleName">mainmicrosoftaccountmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>With a Microsoft account, you can sign into Microsoft products, as well as those of select Microsoft Partners. Signing into your account can enable improved personalization, provide seamless and consistent experiences across products and devices, and help you access and use cloud data storage and other enhanced features and settings.</p><p>When you sign into your account to access a product, we create a record of that sign in. If you sign into a third-party service with your Microsoft account, you will be asked to consent to share the account data required by that service.</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>With a Microsoft account, you can sign into Microsoft products, as well as those of select Microsoft partners. When you create your own Microsoft account, we refer to that account as a personal Microsoft account. When you sign into products that use Microsoft Azure Active Directory (AAD) with an email address from your employer or school, we refer to that account as a work or school account.</p><p><strong>Creating and using your personal Microsoft account</strong>. When you create a personal Microsoft account, you will be asked for certain personal data and we will assign a unique ID number to identify your account and associated information. While some products, such as those involving payment, require a real name, you can sign into and use some Microsoft products without providing your real name. Some data you provide, such as your display name, email address and phone number, can be used to help others find and connect with you within Microsoft products. For example, people who know your display name, email address or phone number can use it to search for you on Skype and send you an invite to connect with them. Note that if you use a work or school email address to create a personal Microsoft account, and your employer or school that issued that address begins managing that account with Azure Active Directory (AAD), you will need to update the email address associated with your personal Microsoft account in order to continue accessing Microsoft products that do not use AAD (such as Xbox Live).\r\n</p><p><strong>Signing in</strong>. When you sign into your Microsoft account, we create a record of your sign-in, which includes the date and time, information about the product you signed into, your sign-in name, the unique number assigned to your account, a unique identifier assigned to your device, your IP address, and your operating system and browser version.</p><p><strong>Signing into Microsoft</strong>. Signing into your account enables improved personalization, provides seamless and consistent experiences across products and devices, and allows you to access and use cloud data storage and other enhanced features and settings. When you sign into your account, you will stay signed in until you sign out. If you add your Microsoft account to a Windows device (version 8 or higher), Windows will automatically sign you into products that use Microsoft account that you access on that device. When you are signed in, some products will display your name or username and your profile photo (if you have added one to your profile) as part of your use of Microsoft products, including in your communications, social interactions and public posts.</p><p><strong>Signing into third-party products</strong>. If you sign into a third-party product with your Microsoft account, you will be asked to consent to share the account data required by that product. The third party will also receive the version number assigned to your account (a new version number is assigned each time you change your sign-in data); and whether your account has been deactivated. The third party can use or share your data according to its own practices and policies. If you have consented to share your profile data, the third party may display your name or username and your profile photo (if you have added one to your profile) when you are signed in to that third-party product. <strong>You should carefully review the privacy statement for each product you sign into to determine how it will use the data it collects.</strong></p><p><strong>Personal Microsoft accounts received from third parties</strong>. If you received your personal Microsoft account from a third party, like an Internet service provider, that third party may have rights over your account, including the ability to access or delete your Microsoft account. <strong>You should carefully review any additional terms the third party provided you to understand what it can do with your account.</strong></p><p><strong>Connecting your personal Microsoft account to your social network accounts</strong>. You may connect your personal Microsoft account to your accounts on social networks such as Facebook, Twitter or LinkedIn in order to access data from those social networks from within Microsoft products. If you choose to do so, we will store data about your social network accounts on our servers so that we can display updated data from your social network account. You can disconnect a social network account from your personal Microsoft account at any time at <a target="_blank" class="mscom-link" href="https://profile.live.com/services">profile.live.com/services</a>.\r\n</p><p><strong>Using work or school accounts</strong>. If your employer or school uses Azure Active Directory (AAD) to issue and manage the account it provides you, you can use your work or school account to sign into Microsoft products that use AAD (such as Office 365 or Skype for Business). If required by your organization, you will also be asked to provide a phone number or an alternative email address for additional security verification. If you sign into Microsoft products with a work or school account, the owner of the domain associated with your email address may control and administer your account, and access and process your data, including the contents of your communications and files. Your use of the products may be subject to your organization\'s policies, if any. Microsoft is not responsible for the privacy or security practices of these organizations, which may differ from those of Microsoft. If your organization is administering your use of Microsoft products, please direct your privacy inquiries to your administrator.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Other Important Privacy Information</span><span id="navigationHeader">Other Important Privacy Information</span><span id="moduleName">mainotherimportantprivacyinformationmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Below you will find additional privacy information you may find important. You can also find more information on Microsoft\'s commitment to protecting your privacy at <a target="_blank" class="mscom-link" href="https://privacy.microsoft.com">privacy.microsoft.com</a>.\t\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Security of Personal Data</span><span id="navigationHeader">Security of Personal Data</span><span id="moduleName">mainsecurityofpersonaldatamodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Microsoft is committed to protecting the security of your personal data. We use a variety of security technologies and procedures to help protect your personal data from unauthorized access, use or disclosure. For example, we store the personal data you provide on computer systems that have limited access and are in controlled facilities. When we transmit highly confidential data (such as a credit card number or password) over the Internet, we protect it through the use of encryption.\t\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Where We Store and Process Personal Data</span><span id="navigationHeader">Where We Store and Process Personal Data</span><span id="moduleName">mainwherewestoreandprocessdatamodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Personal data collected by Microsoft may be stored and processed in your region, in the United States or in any other country where Microsoft or its affiliates, subsidiaries or service providers maintain facilities. We take steps to ensure that the data we collect under this privacy statement is processed according to the provisions of this statement and the requirements of applicable law wherever the data is located.</p><p>\r\n When we transfer personal data from the European Economic Area to other countries, we use a variety of legal mechanisms, including contracts, to help ensure your rights and protections travel with your data. </p><p>As described in our Privacy Shield certification, we also participate in the EU-U.S. Privacy Shield framework. Microsoft adheres to the principles of the Privacy Shield with respect to personal data transferred from the European Economic Area in reliance on the Privacy Shield. If third-party agents process personal data on our behalf in a manner inconsistent with the Privacy Shield Principles, we remain liable unless we prove we are not responsible for the event giving rise to the damage. The U.S. Department of Commerce lists the participants in the Privacy Shield at\r\n <a target="_blank" class="mscom-link" href="https://www.privacyshield.gov/list">https://www.privacyshield.gov/list</a>.</p><p>If you have a question or complaint related to Microsoft\u2019s participation in the Privacy Shield, we encourage you to contact us via our\r\n <a target="_self" class="mscom-link" href="https://go.microsoft.com/fwlink/?LinkId=321116">web form</a>. For any complaints related to the Privacy Shield that cannot be resolved with Microsoft directly, we have chosen to cooperate with a panel established by the European Data Protection Authorities (DPAs) for resolving disputes. Please contact us to be directed to the relevant DPA contacts. As further explained in the Privacy Shield Principles, binding arbitration is available to address residual complaints not resolved by other means. Microsoft is subject to the investigatory and enforcement powers of the U.S. Federal Trade Commission (FTC).</p><p>Microsoft also adheres to both the Swiss-U.S. Safe Harbor privacy principles and the EU-U.S. Privacy Shield privacy principles regarding the collection, use, and retention of personal data from Switzerland. Microsoft does not make any representations related to the effect of that adherence under Swiss law.</p></span></div><div class="divModuleDescription"><span id="Header">Our Retention of Personal Data</span><span id="navigationHeader">Our Retention of Personal Data</span><span id="moduleName">mainOurretentionofpersonaldatamodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Microsoft retains personal data for as long as necessary to provide the products and fulfill the transactions you have requested, or for other essential purposes such as complying with our legal obligations, resolving disputes, and enforcing our agreements. For example:</p><ul><li>For Bing search queries, we de-identify stored queries by removing the entirety of the IP address after 6 months, and cookie IDs and other cross-session identifiers after 18 months. </li><li>In Outlook.com, when your Deleted Items folder is emptied, those emptied items remain in our system for up to 30 days before final deletion. </li><li>\r\n If you remove a credit card from your account, Microsoft will retain transaction records containing your credit card number for as long as reasonably necessary to complete any existing transactions, to comply with Microsoft\'s legal and reporting requirements, and for the detection and prevention of fraud.\r\n </li></ul></span></div><div class="divModuleDescription"><span id="Header">Collection of Data From Children</span><span id="navigationHeader">Collection of Data From Children</span><span id="moduleName">maincollectionofdatafromchildrenmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>When a Microsoft product collects age it will either block users under 13 or will ask them to provide consent from a parent or guardian before they can use it. We will not knowingly ask children under 13 to provide more data than is necessary to provide the product. </p><p>Once parental consent is granted, the child\'s account is treated much like any other account. The child may have access to communication services like email, instant messaging and online message boards and may be able to communicate freely with other users of all ages.</p><p>\r\n Parents can change or revoke the consent choices previously made, and review, edit or request the deletion of their children\'s personal data. For example, parents can access their personal\r\n <a target="_blank" class="mscom-link" href="https://go.microsoft.com/FWLink/p/?LinkID=238657">Microsoft account</a> and click on "Permissions." For users of Minecraft and other Mojang games, parents can contact us at\r\n <a target="_blank" class="mscom-link" href="https://account.mojang.com/terms#contact">account.mojang.com/terms#contact</a>.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Preview Releases</span><span id="navigationHeader">Preview Releases</span><span id="moduleName">mainpreviewreleasesmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Microsoft offers preview, insider, beta or other pre-release products and features ("previews") to enable you to evaluate them while providing feedback, including performance and usage data, to Microsoft. As a result, previews can automatically collect additional data, provide fewer controls, and otherwise employ different privacy and security measures than those typically present in our products. If you participate in previews, we may contact you about your feedback or your interest in continuing to use the product after general release.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Changes to This Privacy Statement</span><span id="navigationHeader">Changes to This Privacy Statement</span><span id="moduleName">mainchangestothisprivacystatementmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\n We will update this privacy statement when necessary to reflect customer feedback and changes in our products. When we post changes to this statement, we will revise the "last updated" date at the top of the statement and describe the changes in the <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/p/?LinkId=780766">Change History</a> page. If there are material changes to the statement or in how Microsoft will use your personal data, we will notify you either by prominently posting a notice of such changes before they take effect or by directly sending you a notification. We encourage you to periodically review this privacy statement to learn how Microsoft is protecting your information. \r\n</p></span></div><div class="divModuleDescription"><span id="Head er">How to Contact Us</span><span id="navigationHeader">How to Contact Us</span><span id="moduleName">mainhowtocontactusmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\n If you have a technical or support question, please visit <a target="_blank" class="mscom-link" href="https://support.microsoft.com/">support.microsoft.com</a> to learn more about Microsoft Support offerings. If you have a\xa0personal Microsoft account\xa0password question, please visit <a target="_blank" class="mscom-link" href="https://go.microsoft.com/FWLink/p/?LinkID=320207">Microsoft account support</a>.\r\n</p><p>\r\n If you have a privacy concern or a question for the Chief Privacy Officer of Microsoft, please contact us by using our <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/?LinkId=321116">Web form</a>. We will respond to questions or concerns within 30 days. \r\n</p><p>\r\n Unless otherwise stated, Microsoft Corporation is a data controller for personal data we collect through the products subject to this statement. Our address is Microsoft Privacy, Microsoft Corporation, One Microsoft Way, Redmond, Washington 98052, USA. Telephone: (+1) 425-882-8080. \r\n</p><p>Microsoft Ireland Operations Limited is our data protection representative for the European Economic Area and Switzerland. The data protection officer of Microsoft Ireland Operations Limited can be reached at the following address: Microsoft Ireland Operations, Ltd., Attn: Data Protection, Carmenhall Road, Sandyford, Dublin 18, Ireland.</p><p>Skype Communications S.\xe0.r.l. 23-29 Rives de Clausen L-2165 Luxembourg, Luxembourg is a data controller for Skype. To contact us in relation to Skype software or products, please submit a support request to the Skype <a target="_blank" class="mscom-link" href="https://support.skype.com/en/">customer support team</a>.</p><p>\r\n To find the Microsoft subsidiary in your country or region, see <a target="_blank" class="mscom-link" href="https://www.microsoft.com/worldwide/">www.microsoft.com/worldwide/</a>.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Bing</span><span id="navigationHeader">Bing</span><span id="moduleName">mainbingmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Bing services include search and mapping services, as well as the Bing Toolbar and Bing Desktop apps. Bing services are also included within other Microsoft services, such as\xa0<a class="mscom-link" title="MSN" href="#mainmainmodule">MSN</a> Apps and <a class="mscom-link" title="Cortana" href="#maincortanamodule">Cortana</a>, and <a class="mscom-link" title="Windows" href="#mainwindowsmodule">Windows</a> (which we refer to as Bing-powered experiences). When you use Bing services, we collect your search queries, location and other information about your interaction with our services.\r\n</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>\r\n Bing services include search and mapping services, as well as the Bing Toolbar and Bing Desktop apps. Bing services are also included within other Microsoft services, such as\r\n <a class="mscom-link" title="MSN" href="#mainmainmodule">MSN</a> Apps and\r\n <a class="mscom-link" title="Cortana" href="#maincortanamodule">Cortana</a>, and certain features in\r\n <a class="mscom-link" title="Windows" href="#mainwindowsmodule">Windows</a> (which we refer to as Bing-powered experiences).\r\n</p><p>\r\n When you conduct a search, or use a feature of a Bing-powered experience that involves conducting a search or entering a command on your behalf, Microsoft will collect the search or\xa0command\xa0terms you provide, along with your IP address, location, the unique identifiers contained in our\r\n <a class="mscom-link" title="rewards.xbox.com" href="#maincookiessimilartechnologiesmodule">cookies</a>, the time and date of your search, and your browser configuration. If you use Bing voice-enabled services, additionally your voice input and performance data associated with the speech functionality will be sent to Microsoft. When you use Bing-powered experiences, such as Ask Cortana or Bing Lookup, to search a particular word or phrase within a web page or document, that word or phrase is sent to Bing along with some surrounding content in order to provide contextually relevant search results.\r\n</p><p><strong>Search Suggestions. </strong>For the\xa0Search Suggestions\xa0feature, the characters that you type into a Bing-powered experience to conduct a search will be sent to Microsoft. This allows us to provide you with suggestions as you type your searches. To turn this feature on or off, go to\r\n <a target="_blank" class="mscom-link" title="rewards.xbox.com" href="https://www.bing.com/account/general">Bing settings</a>.\r\n</p><p><strong>Bing Experience Improvement Program for Bing Desktop and Bing Toolbar. </strong>If you are using Bing Desktop or Bing Toolbar and choose to participate in the Bing Experience Improvement Program, we also collect additional data about how you use these specific Bing apps, such as the addresses of the websites you visit, to help improve search ranking and relevance. To help protect your privacy, we do not use the data collected through the Bing Experience Improvement Program to identify or contact you, or target advertising to you. You can turn off the Bing Experience Improvement Program at any time in the Bing Desktop or Bing Toolbar settings. Finally, we delete the information collected through the Bing Experience Improvement Program after 18 months. </p><p><strong>Retention and de-identification.</strong> We de-identify stored search queries by removing the entirety of the IP address after 6 months, and cookie IDs and other cross-session identifiers after 18 months.</p><p><strong>Personalization through Microsoft account. </strong>Some Bing services provide you with an enhanced experience when you sign in with your personal\r\n <a class="mscom-link" title="rewards.xbox.com" href="#mainmicrosoftaccountmodule">Microsoft account</a>, for example, syncing your search history across devices. You can use these personalization features to customize your interests, favorites, and settings, and to connect your account with third-party services. Visit the\r\n <a target="_blank" class="mscom-link" title="rewards.xbox.com" href="https://www.bing.com/account/general">Bing Settings</a> page to manage your personalization settings. </p><p><strong>Managing Search History.</strong> Bing\'s Search History service provides an easy way to revisit the search terms you\'ve entered and results you\'ve clicked when using Bing search through your browser. You may clear your search history in\r\n <a target="_blank" class="mscom-link" title="rewards.xbox.com" href="https://www.bing.com/profile/history">Bing Settings</a>. Clearing your history removes it from the Search History service and prevents that history from being displayed on the site, but does not delete information from our search logs, which are retained and de-identified as described above.</p><p><strong>Non-Microsoft services that use Bing.</strong> You may access Bing-powered experiences when using other non-Microsoft services, such as those from Yahoo!. In order to provide these services, Bing receives data from these and other partners that may include date, time, IP address, a unique identifier and other search-related data. This data will be sent to Microsoft in order to provide the search service. Microsoft will use this data as described in this statement or as further limited by our contractual obligations with our partners. You should refer to the privacy policies of the non-Microsoft services for any questions about how they collect and use data.\r\n</p><p><strong>Search query passed in referral URL.</strong> When you click on a search result or advertisement from a Bing search results page and go to the destination website, the destination website will receive the standard data your browser sends to every web site you visit - such as your IP address, browser type and language, and the URL of the site you came from (in this case, the Bing search results page). Because the URL of the Bing search results page contains the text of the search query you entered (which could include names, addresses, or other identifying information), the destination website will be able to determine the search term you entered.\r\n</p><p>\r\n If your browser is enabled to allow pages to pre-load in the background for faster performance,\xa0when your browser loads a page in the background, it will have the same effect as if you visited that page, including sending the Bing search results page URL (containing your search query) and downloading any\r\n <a class="mscom-link" title="rewards.xbox.com" href="#maincookiessimilartechnologiesmodule">cookies</a> that page sets.\r\n</p><p><strong>Sharing search data for research and development purposes.</strong>\xa0We share some de-identified search query data with selected third parties for research and development purposes. Before we do so, we remove all unique identifiers such as IP addresses and cookie IDs from the data. We also run the data through a process designed to remove certain sensitive data that users may have included in the search terms themselves (such as social security numbers or credit card numbers). Additionally, we require these third parties to keep the data secure and to not use the data for other purposes.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Cortana</span><span id="navigationHeader">Cortana</span><span id="moduleName">maincortanamodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Cortana is your personal assistant. Cortana works best when you sign in and let her use data from your device, your personal Microsoft account, other Microsoft services, and third-party services you choose to connect. If you choose not to sign into Cortana, you can still chat with Cortana and use Cortana to help you search the web and your device. But if you don\u2019t sign in, your experiences will be more limited and they will not be personalized.</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>\r\n Cortana is your personal assistant. Cortana works best when you sign in and let her use data from your device, your personal Microsoft account, other Microsoft services, and third-party services you choose to connect. If you choose not to sign into Cortana, you can still chat with Cortana and use Cortana to help you search the web and your device. But if you don\u2019t sign in, your experiences will be more limited and they will not be personalized.\r\n</p><p><strong>Signed out</strong>. When you are not signed in, Cortana will collect data about how you chat with Cortana and use Cortana to search, using either your voice, inking, or typing. This data includes the following:</p><ul><li><strong>Speech, inking, and typing</strong>. To help Cortana better understand the way you speak and your voice commands, speech data is sent to Microsoft to build speech models and improve speech recognition and user intent understanding. If you choose to sign in, the speech models will become more personalized.</li><li><strong>Search history</strong>. Your Bing search queries - even if Cortana does the searching for you - are treated like any other Bing search queries and are used as described in the <a class="mscom-link" href="#mainbingmodule">Bing</a> section.</li><li><strong>Device Data</strong>. Cortana can access data about your device and how you use it. For instance, it can determine if Bluetooth is on, whether your lock screen in on, your alarm settings, and which apps you install and use.</li></ul><p><strong>Signed in</strong>. If you sign in, you enable Cortana to perform additional tasks and to provide personalized experiences and relevant suggestions; and you give Cortana permission to collect or access the following additional types of data:</p><ul><li><strong>Microsoft account</strong>. Cortana can access the demographic data (such as your age, postal code and gender) you provided when you created your personal <a class="mscom-link" href="#mainmicrosoftaccountmodule">Microsoft account</a>.</li><li><strong>Other Microsoft product usage</strong>. Cortana uses data collected through other Microsoft services to provide personalized suggestions. For example, Cortana uses data collected by the MSN Sports app so it can automatically display information about the teams you follow. It also learns your favorite places from Microsoft\'s Maps app, your favorite songs and artists from the music you play in <a class="mscom-link" href="#maingroovemusicmoviestvmodule">Groove Music</a>, and what you view and purchase in the <a class="mscom-link" href="#mainwindowsstoremodule">Windows Store</a> so it can offer better suggestions. Your interests in Cortana\'s Notebook can be used by other Microsoft services, such as Bing or MSN, to customize your interests, preferences, and favorites in those experiences as well.</li></ul><p><strong>Location</strong>. You can choose whether Cortana accesses your location information in order to give you the most relevant notices and results and to make suggestions that help save you time, such as traffic information and location-based reminders. If you grant permission, Cortana will regularly collect and use your current location, location history, and other location signals (such as locations tagged on photos you upload to OneDrive).</p><p><strong>Contacts, email, calendar &amp; communications</strong>. You can choose to let Cortana access your email and other communications, your calendar, and your contacts in order to enable additional features and personalization. If you give permission, Cortana will access additional data including:</p><ul><li><strong>Text messages and email</strong>. Cortana accesses your messages to do a variety of things such as: allowing you to add events to your calendar, apprising you of important messages, and keeping you up to date on events or other things that are important to you, like package or flight tracking. Cortana also uses your messages to help you with planning around your events and offers other helpful suggestions and recommendations.</li><li><strong>Communications History</strong>. Cortana learns who is most important to you from your call, text message, and email history. This data is used to keep track of people most relevant to you and your preferred methods of communication, flag important messages for you (such as missed calls), and improve the performance of Cortana features such as speech recognition.</li><li><strong>Calendar appointments</strong>. Cortana access your calendars in order to provide reminders and information relevant to your appointments.</li></ul><p><strong>Browsing history</strong>. If you allow Cortana to use your Microsoft Edge browsing history (see the <a class="mscom-link" href="#mainwebbrowsersmodule">Microsoft Edge</a> description in the Windows section of this statement), Cortana can help you pick up where you left of on websites, and provide suggestions based on the sites you visit in Microsoft Edge. Cortana won\'t collect information about sites you visit in InPrivate tabs.</p><p><strong>Other Connected Services</strong>. You can also give Cortana access to other data collected by other Microsoft and third party services by connecting those services with Cortana.</p><ul><li><strong>Connected Microsoft services</strong>. If you choose to connect Cortana to your <a class="mscom-link" href="#mainxboxmodule">Xbox Live</a> account, Cortana can access your Xbox Live data in order to learn about your gaming activity and provide you with relevant content and suggestions, notify you when your friends are available to play, and help you schedule game sessions. If you choose to connect Cortana to your <a class="mscom-link" href="#mainenterpriseservicesmodule">Office 365</a> work or school account, Cortana can access data stored in Office 365 to help you stay up to date and get insights about your meetings, documents, and relationships.</li><li><strong>Connected third-party services</strong>. Cortana allows you to connect to third-party services to enable her to do more and provide additional personalized experiences based upon data from the third-party service, such as LinkedIn or Uber. For example, choosing to sign into LinkedIn within Cortana allows Microsoft to access your LinkedIn data so that Cortana can give you more personalized information and recommendations. <strong><em>When Cortana is connected to a third-party service, it can also send data to that service to enable the connected service</em></strong>. For instance, Cortana will send to LinkedIn the name, email address, job title, and company name of people you are meeting with, in order for Cortana to retrieve relevant information about those contacts. Similarly, Cortana will send your current location and destination to Uber when you ask Cortana to request a ride. You can manage Cortana\'s connections to third-party services in the Cortana Notebook.</li></ul><p>Remember that you can always sign out of Cortana, and when you do, Cortana will still be there to help, but your experiences will not be personalized. You can manage what data Cortana uses, and what it knows about you in Cortana Settings, Permissions, and Notebook. More about the individual features, and how to manage them can be found at <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/?linkid=522360">go.microsoft.com/fwlink/?linkid=522360</a>.</p></span></div><div class="divModuleDescription"><span id="Header">Groove Music/Movies &amp; TV</span><span id="navigationHeader">Groove Music/Movies &amp; TV</span><span id="moduleName">maingroovemusicmoviestvmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\n Groove Music lets you easily play your music collection, make playlists, buy music and stream custom radio stations. Microsoft Movies &amp; TV allows you to play your video collection, and rent or buy movies and TV episodes. Microsoft will use data about the content you play in order to help you discover content that may interest you.\r\n </p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>\r\n Groove Music lets you easily play your music collection, make playlists, buy music and stream custom radio stations. Microsoft Movies &amp; TV allows you to play your video collection, and rent or buy movies and TV episodes. These services were formerly offered as Xbox Music and Video.\r\n </p><p>\r\n To help you discover content that may interest you, Microsoft will collect data about what content you play, the length of play, and the rating you give it. If you enable Cortana on your device, Microsoft will collect and use data related to the music you play via Groove Music to provide personalized experiences and relevant suggestions.\r\n </p><p>\r\n To enrich your experience when playing content, Groove Music and Movies &amp; TV will display related information about the content you play and the content in your music and video libraries, such as the album title, cover art, song or video title, and other information, where available. To provide this information, Groove Music and Movies &amp; TV send an information request to Microsoft containing standard device data, such as your device IP address, device software version, your regional and language settings, and an identifier for the content.\r\n </p><p>\r\n If you use Groove Music or Movies &amp; TV to access content that has been protected with Microsoft Digital Rights Management (DRM), it may automatically request media usage rights from an online rights server and download and install DRM updates in order to let you play the content. See the DRM information in the <a class="mscom-link" href="#mainsilverlightmodule">Silverlight</a> section of this privacy statement for more information.\r\n </p></span></div><div class="divModuleDescription"><span id="Header">Microsoft Cognitive Services</span><span id="navigationHeader">Microsoft Cognitive Services</span><span id="moduleName">mainmicrosoftcognitiveservicesmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Microsoft Cognitive Services help developers build apps that can better comprehend data, such as by detecting faces and objects in images, understanding spoken words, or interpreting commands. We collect and use your data to provide the services, which includes improving and personalizing your experiences.</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>Microsoft Cognitive Services help developers build apps that can better comprehend data, such as by detecting faces and objects in images, understanding spoken words, or interpreting commands. We collect and use your data to provide the services, which includes improving and personalizing your experiences.</p><p>Cognitive Services collect and use many types of data, such as images, audio files, video files, or text, all of which are retained by Microsoft. Microsoft has implemented business and technical measures designed to help de-identify some data Cognitive Services retain. De-identification will not anonymize data completely; for example, a person in a photograph could still be recognized by someone who knows that person.</p><p>Microsoft and apps that use Cognitive Services may also collect and use your data. For example, Bing uses search queries collected through the Cognitive Services Bing Search APIs as described in the Bing section. Microsoft Translator uses data sent through the Cognitive Services Translator API as described in the Translator section.</p></span></div><div class="divModuleDescription"><span id="Header">Microsoft Health Services</span><span id="navigationHeader">Microsoft Health Services</span><span id="moduleName">mainmicrosofthealthservicesmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\n Microsoft Health services can help you understand and manage your health data. They include the Microsoft Band devices, Microsoft Health apps, HealthVault, and other related services. The Band helps you keep track of data like heart rate and steps taken. The Band can also use Cortana to take notes and receive notifications from your phone. The Microsoft Health app sends data to Microsoft\'s servers and allows you to manage and control the data. The app provides a channel for other apps on your phone to send notifications to the Band. HealthVault is a personal health platform that lets you gather, edit, add to, and store health data online. With HealthVault, you can also choose to share your health data with family, caregivers, and health care professionals.\r\n</p><p>\r\n Microsoft Health services collect and use your data to provide the services, which includes improving and personalizing your experiences. Health data you provide to Microsoft through Microsoft Health services is not combined with data from other Microsoft services, or used for other purposes without your explicit consent. For example, Microsoft does not use your health record data to market or advertise to you without your opt-in consent.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Microsoft Health and Microsoft Band</span><span id="navigationHeader">Microsoft Health and Microsoft Band</span><span id="moduleName">mainmicrosofthealthandbandmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\n Microsoft Health and Microsoft Band can help you understand and manage your health data. The data collected depends on the services and features you use, and includes the following: \r\n</p><ul><li><strong>Profile Data</strong>. When you create a profile, you will need to provide data, such as height, weight, and age that is used to calculate your activity results. Other profile data comes from your personal <a class="mscom-link" href="#mainmicrosoftaccountmodule">Microsoft account</a>.\r\n </li><li><strong>Activity and Fitness Data</strong>. Microsoft Band helps you keep track of your activity and fitness by collecting data like your heart rate, steps, calories burned, and sleep. Examples of types of activities you can choose to track are runs, workouts, and sleep.\r\n </li><li><strong>Usage Data</strong>. To provide you the best service, we collect and automatically upload statistics about the performance and your use of the Microsoft Health and Microsoft Band.\r\n </li><li><strong>Location</strong>. Microsoft Band has built-in Global Positioning System (GPS) capabilities, which let you map your activities like running or biking, without having to carry your phone with you. If you enable GPS for an activity, you can view the activity map in the Microsoft Health app. Some modes on the Band, such as Golf and Explorer, automatically turn on GPS, and turn it off when you end the mode.\xa0\r\n </li></ul><p>To learn more about the Band\'s sensors and the data they collect, go <a target="_blank" class="mscom-link" href="https://www.microsoft.com/microsoft-band/support/hardware/sensors">here</a>.</p><p><strong>Access and Control</strong>. You can view and manage your data in Microsoft Health. For example, in Microsoft Health, you can view and update your profile data, manage connected applications, and view past activities. You can delete specific activity details in the Microsoft Health app. When you delete a specific activity, the event is deleted from the Microsoft Health service; however, the basic sensor data captured by the devices remain in the Microsoft Health service. You can cancel your Microsoft Health account at any time by contacting Customer Support <a target="_blank" class="mscom-link" href="http://aka.ms/w6r45e">here</a>.\r\n</p><p><strong>Cortana</strong>. The Band allows you to take notes, perform queries, and set reminders with your voice, if <a class="mscom-link" href="#maincortanamodule">Cortana</a> is enabled on your phone. To learn more about how <a class="mscom-link" href="#maincortanamodule">Cortana</a> manages your data, see the Cortana section of this privacy statement.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">HealthVault</span><span id="navigationHeader">HealthVault</span><span id="moduleName">mainhealthvaultmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\n HealthVault is a personal health platform that lets you gather, edit, store, and share health data online. With HealthVault, you can control your own health records. You can also choose to share your health data with family, caregivers, health care professionals, mobile apps, health-related devices, and online tools. For more information about HealthVault, go to <a target="_blank" class="mscom-link" href="http://aka.ms/kr4ndl">here</a>.\r\n</p><p><strong>Signing into HealthVault</strong>. To sign into HealthVault, you can use <a class="mscom-link" href="#mainmicrosoftaccountmodule">Microsoft account</a> or a third-party authentication service. If you close your Microsoft account or lose your account credentials, you may not be able to access your data. You can use more than one credential with HealthVault to help ensure continued access. Before using a third-party authentication service with HealthVault, we recommend you review the security and privacy commitments offered by the issuer.\r\n</p><p><strong>HealthVault Account and Health Records</strong>. To create a new HealthVault account, you must provide personal data such as name, date of birth, e-mail address, postal code and country/region. Depending on which features you use, you may be asked for additional information. A HealthVault account allows you to manage one or more health records, such as the ones you create for yourself and your family members. You can add or remove data to a health record you manage at any time.\r\n</p><p>\r\n In the U.S., HealthVault assigns each health record an email address. When a message is received at that email address, the message and attachments are automatically added to the HealthVault record, and a notification email is sent to the custodians of that record. The email service in HealthVault uses "Direct," a protocol designed specifically to communicate with health care providers. For that reason, HealthVault email can only be sent and received with providers that use a system that uses the Direct protocol. Custodians can add or disable record email addresses. \r\n</p><p><strong>Sharing Health Data</strong>. A key value of HealthVault is the ability you have to share your health data with people and services that can help you meet your health-related goals. By default, you are the custodian of any records you create. Custodians have the highest level of access to a health record. As a custodian, you can share data in a health record with another person by sending an e-mail invitation through HealthVault. You can specify what type of access they have (including custodian access), how long they have access, and whether they can modify the data in the record. When you grant someone access, that person can grant the same level of access to someone else (for example, someone with view-only access can grant another user view-only access). <strong>Because inappropriate granting of access could allow someone to violate your privacy or even revoke your access to your own records, you should be cautious about granting access to your records.</strong></p><p>\r\n You can choose to share specific data (or all of the data) in a health record with other services. No service has access to your data through HealthVault unless an authorized user grants it access through HealthVault. HealthVault allows you to control access by accepting or denying requests. For each service granted access, you choose what health information in a specific health record to share and what actions each service may perform on the health information.\r\n</p><p>\r\n A service you authorize for a record will get the full name associated with your HealthVault account, the nickname of the authorized record(s), and your relationship to that record. The service will continue to have access through HealthVault until you revoke the permission. Microsoft can revoke a service\'s access to HealthVault if it does not meet its privacy commitments to Microsoft. However, except for restricting the access they have to your HealthVault data, we do not control or monitor those services, and their privacy practices will vary.\r\n</p><p><strong>Reports to U.S. Health Care Providers</strong>. In the United States, we enable participating health care providers to obtain reports about whether the information they send to a record is used. This feature supports the "meaningful use" objective of the HITECH Act, which provides incentives for health care providers to send their patients copies of their medical information electronically. Providers that participate can get reports that include a number the provider uses to identify the patient within its system, and whether the user took one of the "qualifying actions" in HealthVault (but no information about which action). "Qualifying action" currently includes activities such as viewing, downloading, or transmitting health information via email. You can turn off reporting for your records.\r\n</p><p><strong>Access and controls</strong>. You can review, edit or delete your HealthVault account data, or close your HealthVault account at any time. Only custodians can permanently delete an item. When you delete a h eath record, it is deleted from all users who had access to it.\r\n</p><p>\r\n When you close your HealthVault account, we delete all records for which you are the sole custodian. If you share custodian access for a record, you can decide whether to delete the record. Microsoft will wait a limited amount of time before permanently deleting your data in order to help avoid accidental or malicious removal of your health data.\r\n</p><p>\r\n HealthVault maintains a full history of each access, change or deletion by users and services, which includes the date, action and name of the person or service. Custodians of records can examine the history of those records.\r\n</p><p><strong>Email Communications</strong>. We will use the email address you provide when you create your HealthVault account to send you an email requesting that you validate your email address, to include in sharing invitations you send through HealthVault, and to send you service notifications, such as email notifications that information is available to add to your HealthVault records.\r\n</p><p>\r\n HealthVault periodically sends newsletters to help keep you informed of the latest improvements. HealthVault will also periodically send you an email summarizing recent account activity. Subject to your contact preferences, we also use your email addresses to send you promotional email. You can unsubscribe from these emails at any time. \r\n</p></span></div><div class="divModuleDescription"><span id="Header">Microsoft Translator</span><span id="navigationHeader">Microsoft Translator</span><span id="moduleName">mainMicrosoftTranslatormodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Microsoft Translator is a statistical machine translation system designed to automatically translate text and speech between numerous supported languages. Translator may be incorporated into other Microsoft products and services, such as Office, SharePoint, and Bing. Third parties may also incorporate Translator into their own services and offerings. For information on the privacy practices of third-parties\u2019 services and offerings, consult their privacy statements.</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>Microsoft Translator is a statistical machine translation system designed to automatically translate text and speech between numerous supported languages. Translator may be incorporated into other Microsoft products and services, such as Office, SharePoint, and Bing. Third parties may also incorporate Translator into their own services and offerings. For information on the privacy practices of third-parties\u2019 services and offerings, consult their privacy statements.</p><p>Microsoft Translator collects and uses the text, image, and speech data you submit, as well as information about how you are accessing the Translator service, such as operating system version, browser type and language. We use your data to provide the Translator service, which includes improving and personalizing your experiences. Microsoft has implemented business and technical measures designed to help de-identify the data Translator retains. For example, we randomly sample text to improve Translator and mask or delete strings of numbers and other personally identifiable information we detect in the sample.</p><p>If you subscribe to the Microsoft Translator API with a monthly volume of 250 million characters or more, you may request to have logging turned off for the text you submit to Microsoft Translator by submitting a request using the process detailed at <a class="mscom-link" href="https://www.microsoft.com/translator/notrace.aspx">www.microsoft.com/translator/notrace.aspx</a>.</p></span></div><div class="divModuleDescription"><span id="Header">MSN</span><span id="navigationHeader">MSN</span><span id="moduleName">mainmainmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>MSN services include websites and a suite of apps. We collect information about the installation of MSN Apps and the devices on which they are installed. We also collect data about how you interact with MSN services, such as usage frequency and content viewed.\r\n</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>\r\n MSN services include websites and a suite of apps, including MSN News, Weather, Sports, and Money, and previous versions of the apps branded as Bing (together, "MSN Apps"). The MSN Apps are available on various platforms, including Windows, iOS, and Android. MSN services are also included within other Microsoft services, including the Microsoft Edge browser.\xa0\r\n </p><p>\r\n When you install MSN Apps, we collect data that tells us if the app was installed properly, the installation date, the app version, and other data about your device such as the operating system and browser. This data is collected on a regular basis to help us determine the number of MSN App users and identify performance issues associated with different app versions, operating systems, and browsers.\r\n </p><p>\r\n We also collect data about how you interact with MSN services, such as usage frequency and content viewed. Some MSN\xa0services provide an enhanced experience when you sign in with your Microsoft account, including allowing you to customize your interests and favorites. You can manage personalization through MSN and Bing settings, as well as through settings in other Microsoft services that include\xa0MSN services. We also use the data we collect to provide you with advertisements that may be of interest to you. You can opt out of interest-based advertising through the advertising links within MSN services, or by visiting Microsoft\'s <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/?LinkID=286759">opt-out page</a>.\r\n </p><p>\r\n Previous versions of MSN Money allow you to access personal finance information from third-party financial institutions. MSN Money only displays this information and does not store it on our servers. Your log-in credentials used to access your financial information from third parties are encrypted on your device and are not sent to Microsoft. These financial institutions, as well as any other third-party services you access through MSN services, are subject to their own terms and privacy policies.\r\n </p></span></div><div class="divModuleDescription"><span id="Header">Office</span><span id="navigationHeader">Office</span><span id="moduleName">mainofficeservicesmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Office is a collection of productivity applications including Word, Excel, PowerPoint, and Outlook among others. For more details about Outlook, see the <a class="mscom-link" href="#mainoutlookmodule">Outlook</a> section of this privacy statement. Various Office applications enable you to use content and functionality from other Microsoft and third-party connected services such as Bing. For detailed information about how to manage your privacy options, please see <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/?LinkId=624445">go.microsoft.com/fwlink/?LinkId=624445</a>. If you work in an organization, your administrator can turn off connected services via Group Policy.</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>Office is a collection of productivity applications including Word, Excel, PowerPoint, and Outlook among others. For more details about Outlook, see the <a class="mscom-link" href="#mainoutlookmodule">Outlook</a> section of this privacy statement. Various Office applications enable you to use content and functionality from other Microsoft and third-party connected services such as Bing. For detailed information about how to manage your privacy options, please see <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/?LinkId=624445">go.microsoft.com/fwlink/?LinkId=624445</a>. If you work in an organization, your administrator can turn off connected services via Group Policy.</p><p><strong>Office Roaming Service</strong>. The Office Roaming Service helps keep your Office settings up-to-date across your devices running Office. When you sign into Office with your <a class="mscom-link" href="#mainmicrosoftaccountmodule">Microsoft account</a>, the Office Roaming Service is turned on and syncs some of your customized Office settings to Microsoft servers (such as a list of most recently used documents and the last location viewed within a document). When you sign into Office on another device with the same account, the Office Roaming Service downloads your settings from Microsoft servers and applies them to the additional device. The Office Roaming Service also applies some of your customized Office settings when you sign into Office.com. When you sign out of Office, the Office Roaming Service removes your Office settings from your device. Any changes you made to your customized Office settings are sent to Microsoft servers.</p><p><strong>Microsoft Updates</strong>. Office uses the <a class="mscom-link" href="#mainupdateservicemodule">Microsoft Update</a> service to provide you with security and other important updates. See the Update Services section of this privacy statement for more information.</p><p><strong>Online Help, templates, fonts, and other content</strong>. Office uses other Microsoft or third-party services to give you the latest online content when you are connected to the Internet such as Help articles, templates, and fonts. For example, when you use the Help feature in Office applications, Office sends your search query to Office.com to provide you with online Help articles. These features are turned on by default, but you can turn them off using privacy settings. You can access privacy settings in Office 2013 by clicking <strong>File &gt; Options &gt; Trust Center &gt; Trust Center Settings &gt; Privacy Options</strong>.</p><p><strong>Click-to-Run Update Service</strong>. The Click-to-Run Update Service allows you to install certain Microsoft Office products over the Internet so you can start using them before they are completely downloaded. By default, the Click-to-Run Update Service also automatically detects online updates to Click-to-Run-enabled products on your device and downloads and installs them automatically. The service is turned on by default, but you can turn it off by using privacy settings.\r\n</p><p><strong>Search services</strong>. Office-supported search services such as Insights allow you to request information from Microsoft or third-party services from within an Office application. For example, in Word, you can highlight a word or phrase and retrieve relevant information from Bing search. When you search on a particular word or phrase, Office sends to the service the encrypted text you requested (and when using Insights, in order to provide you with contextually relevant search results, Office will send your requested word or phrase and some surrounding content from your document). In Excel, you can send categories of data to Microsoft in order to receive recommendations for other sets of similar data that might interest you, but the actual content from your workbook isn\'t sent to Microsoft. In addition, Office will send data about the software you\'re using and the locale to which your system is set. If required by a third-party content provider, it will also send authorization data indicating you have the right to download the relevant content. Frequently, the information you receive includes a link to additional information from the content provider\'s website. If you click the link, the content provider may place a <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">cookie</a> on your device to identify you for future transactions.</p><p><strong>Translation service</strong>. Some Office applications allow you to translate some or all of your document by using a bilingual dictionary or a machine translation. If a word or phrase you want to translate isn\'t in the bilingual dictionary included with your application software, the word or phrase is sent unencrypted to a Microsoft or a third-party translation service. If you choose to translate your entire document, the entire document is sent unencrypted to a Microsoft or a third-party translation service. In addition to the word or phrase you want to translate, Office sends information about the Office software you are using, including the version, operating system, and locale and language to which your system is set. For third-party translation services, Office might also send previously stored authentication information indicating that you previously signed up for access to the website.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">OneDrive</span><span id="navigationHeader">OneDrive</span><span id="moduleName">mainonedrivemodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\n OneDrive lets you store and access your files on virtually any device. You can also share and collaborate on your files with others. Some versions of the OneDrive application enable you to access both your personal OneDrive by signing in with your personal Microsoft account and your OneDrive for Business by signing in with your work or school Microsoft account\xa0as part of your organization\'s use of Office 365.\r\n </p><p>\r\n When you store content in OneDrive, that content will inherit the sharing permissions of the folder in which you store it. For example, if you store content in a public folder, the content will be public and available to anyone on the Internet who can find the folder.\r\n </p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>\r\n OneDrive lets you store and access your files on virtually any device. You can also share and collaborate on your files with others. Some versions of the OneDrive application enable you to access both your personal OneDrive by signing in with your personal Microsoft account and your OneDrive for Business by signing in with your work or school Microsoft account as part of your organization\'s use of Office 365.\r\n </p><p>\r\n When you use OneDrive, we collect data about your usage of the service, as well as the content you store in order to provide, improve and protect the services. Examples include, indexing the contents of your OneDrive documents so that you can search for them later and using location information to enable you to search for photos based on where the photo was taken. We also collect device information so we can deliver personalized experiences, such as enabling you\xa0to sync content across devices and roam customized settings.\r\n </p><p>\r\n When you store content in OneDrive, that content will inherit the sharing permissions of the folder in which you store it. For example, if you store content in the public folder, the content will be public and available to anyone on the Internet who can find the folder. If you store content in a private folder, the content will be private.\r\n </p><p>\r\n When you share content to a social network like Facebook from a phone that you have synced with your OneDrive account, your content is either uploaded to that network or a link to that content is posted to that network. Content posted to social networks and hosted on OneDrive is accessible to anyone on that social network. To delete the content, you need to delete it from the social network and from OneDrive.\r\n </p><p>\r\n When you share your OneDrive content with your friends via a link, an email with the link is sent to those friends. The link contains an authorization code that allows anyone with the link to access your content. If one of your friends sends the link to other people, they will also be able to access your content, even if you did not choose to share the content with them. To revoke permissions for your content on OneDrive, sign into your\xa0account and then select the specific content to manage the permission levels. Revoking permissions for a link effectively deactivates the link. No one will be able to use the link to access the content unless you decide to share the link again.\r\n </p><p>\r\n Files managed with OneDrive for Business are stored separately from files stored with your personal OneDrive. OneDrive for Business\xa0collects and transmits personal data for authentication, such as your email address and password, which will be transmitted to Microsoft and/or to the provider of your Office 365 service.\r\n </p></span></div><div class="divModuleDescription"><span id="Header">Outlook</span><span id="navigationHeader">Outlook</span><span id="moduleName">mainoutlookmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Outlook products are designed to improve your productivity through improved communications and include Outlook.com, Outlook applications, and related services. Outlook.com is Microsoft\'s primary consumer email service, and includes email accounts with addresses that end in outlook.com, live.com, hotmail.com, and msn.com. Outlook applications include desktop and mobile apps that permit you to manage email, calendar items, files, contacts, and other data.</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>Outlook products are designed to improve your productivity through improved communications and include Outlook.com, Outlook applications, and related services.</p><p><strong>Outlook.com</strong>. Outlook.com is Microsoft\'s primary consumer email service, and includes email accounts with addresses that end in outlook.com, live.com, hotmail.com, and msn.com. Outlook.com provides features that let you connect with your friends on social networks. You will need to create a <a class="mscom-link" href="#mainmicrosoftaccountmodule">Microsoft account</a> to use Outlook.com.</p><p>When you delete an email or item from a mailbox in Outlook.com, the item generally goes into your Deleted Items folder where it remains for approximately 7 days unless you move it back to your inbox, you empty the folder, or the service empties the folder automatically, whichever comes first. When the Deleted Items folder is emptied, those emptied items remain in our system for up to 30 days before final deletion.</p><p><strong>Outlook Applications</strong>. Outlook client applications are software you install on your device that permits you to manage email, calendar items, files, contacts, and other data from email, file storage, and other services, like Exchange Online or Outlook.com, or servers, like Microsoft Exchange. You can use multiple accounts from different providers, including third-party providers, with Outlook applications.</p><p>To add an account, you must provide permission for Outlook to access data from the email or file storage services.</p><p>When you add an account to Outlook, your mail, calendar items, files, contacts, settings and other data from that account will automatically sync to your device. If you are using the mobile Outlook application, that data will also sync to Microsoft servers to enable additional features such as, faster search, personalized filtering of less important mail, and an ability add email attachments from linked file storage providers without leaving the Outlook application. If you are using the desktop Outlook application, you can choose whether to allow the data to sync to our servers. At any time, you can remove an account or make changes to the data that is synced from your account.</p><p>If you add an account provided by an organization (such as your employer or school), the owner of the organizational domain can implement policies and controls (for example, requiring multi-factor authentication or the ability to remotely wipe data from your device) that can affect your use of Outlook.</p><p>To learn more about the data the Outlook applications collect and process, please see the <a class="mscom-link" href="#mainofficeservicesmodule">Office</a> section of this privacy statement.</p></span></div><div class="divModuleDescription"><span id="Header">Silverlight</span><span id="navigationHeader">Silverlight</span><span id="moduleName">mainsilverlightmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Microsoft Silverlight helps you to access and enjoy rich content on the Web. Silverlight enables websites and services to store data on your device. Other Silverlight features involve connecting to Microsoft to obtain updates, or to Microsoft or third-party servers to play protected digital content.\r\n</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>\r\n Microsoft Silverlight helps you to access and enjoy rich content on the Web. Silverlight enables websites and services to store data on your device. Other Silverlight features involve connecting to Microsoft to obtain updates, or to Microsoft or third-party servers to play protected digital content.\r\n </p><p><strong>Silverlight Configuration tool.</strong> You can make choices about these features in the Silverlight Configuration tool. To access the Silverlight Configuration tool, right click on content that is currently being displayed by Silverlight and select <strong>Silverlight</strong>. You can also run the Silverlight Configuration tool directly. In Windows, for example, you can access the tool by searching for "Microsoft Silverlight." </p><p><strong>Silverlight application storage. </strong>Silverlight-based applications can store data files locally on your computer for a variety of purposes, including saving your custom settings, storing large files for graphically intensive features (such as games, maps, and images), and storing content that you create within certain applications. You can turn off or configure application storage in the Silverlight Configuration tool.\r\n </p><p><strong>Silverlight updates. </strong>Silverlight will periodically check a Microsoft server for updates to provide you with the latest features and improvements. A small file containing information about the latest Silverlight version will be downloaded to your computer and compared to your currently installed version. If a newer version is available, it will be downloaded and installed on your computer. You can turn off or configure updates in the Silverlight Configuration tool.\r\n </p><p><strong>Digital Rights Management. </strong>Silverlight uses Microsoft Digital Rights Management (DRM) technology to help protect the rights of content owners. If you access DRM-protected content (such as music or video) with Silverlight, it will request media usage rights from a rights server on the Internet. In order to provide a seamless playback experience, you will not be prompted before Silverlight sends the request to the rights server. When requesting media usage rights, Silverlight will provide the rights server with an ID for the DRM-protected content file and basic data about your device, including data about the DRM components on your device such as their revision and security levels, and a unique identifier for your device.\r\n </p><p><strong>DRM updates.</strong> In some cases, accessing DRM-protected content will require an update to Silverlight or to the DRM components on your device. When you attempt to play content that requires a DRM update, Silverlight will send a request to a Microsoft server containing basic data about your device, including information about the DRM components on your computer such as their revision and security levels, troubleshooting data, and a unique identifier for your device. The Microsoft server uses this identifier to return a unique DRM update for your device, which will then be installed by Silverlight. You can turn off or configure DRM component updates on the <strong>Playback</strong> tab in the Silverlight Configuration tool.\r\n </p></span></div><div class="divModuleDescription"><span id="Header">Skype</span><span id="navigationHeader">Skype</span><span id="moduleName">mainskypemodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Skype lets you send and receive voice, video and instant message communications. As part of providing these features, Microsoft collects, uses and shares personal data, including data about your communications, as described in more detail in Learn More.\t\r\n</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>Skype lets you send and receive voice, video and instant message communications. This section applies to the consumer version of Skype; if you are using Skype for Business, see the <a class="mscom-link" href="#mainenterpriseservicesmodule">Enterprise Products</a> section of this privacy statement. Both Microsoft Corporation and Skype Communications S.\xe0.r.l. (a wholly-owned Microsoft subsidiary based in Luxembourg) are data controllers for Skype, and references to Microsoft in this section refer to both legal entities.</p><p>As part of providing these features, Microsoft collects usage data about your communications that includes the time and date of the communication and the numbers or usernames that are part of the communication. </p><p><strong>Skype profile</strong>. To enable other people to find you on Skype (or products that interact with Skype, such as Skype for Business), depending on your profile settings, your Skype profile is included in the search directory. Your profile includes your username, avatar, and any other data you choose to add to your profile or display to others.</p><p><strong>Skype Contacts</strong>. If you use a Microsoft service, such as Outlook.com, to manage contacts, Skype will automatically add the people you know to your Skype contact list. With your permission, Skype will also check your device or other address books from time to time to automatically add your friends as Skype contacts. You can block users if you don\u2019t want to receive their communications. </p><p><strong>Partner companies</strong>. To make Skype available to more people, we partner with other companies to allow Skype to be offered via those companies\u2019 services. If you use Skype through a company other than Microsoft, that company\u2019s privacy policy governs how it handles your data. To comply with applicable law or respond to valid legal process, or to help our partner company or local operator comply or respond, we may access, transfer, disclose, and preserve your data. That data could include, for example, your private content, such as the content of your instant messages, stored video messages, voicemails, or file transfers. </p><p><strong>Skype Manager</strong>. Skype Manager lets you manage a group\u2019s (such as your family\u2019s) Skype usage from one central place. When you set up a group, you will be the Skype Manager Administrator and can see the patterns of usage, including detailed information, like traffic data and details of purchases, of other members of the group who have consented to such access. If you add information like your name, other people in the group will be able to see it. Members of the group can withdraw consent for Skype Manager on their account page at <a target="_blank" class="mscom-link" href="https://www.skype.com/">www.skype.com</a>. </p><p><strong>Skype marketing affiliate program.</strong> So that more people can learn about Skype, we encourage other companies and organizations to sign up as marketing affiliates to refer people to Skype. When the people they refer do things like buy Skype Credit, we pay them. We partner with another company, Conversant Media, to operate our affiliate network. Microsoft, our network partner, and the marketing affiliates use cookies and web beacons so we can know which marketing affiliate made a successful referral and earned a payment. Microsoft doesn\u2019t control the cookies that the marketing affiliates set. For more information on the privacy practices of our network partner, visit <a target="_blank" class="mscom-link" href="http://www.conversantmedia.com/legal/privacy">www.conversantmedia.com/legal/privacy</a>.</p><p><strong>Push notifications</strong>. To let you know of incoming calls, chats and other messages, Skype apps use the notification service on your device. For many devices, these services are provided by a another company. To tell you who is calling, for example, or to give you the first few words of the new chat, Skype has to tell the notification service so that they can provide the notification to you. The company providing the notification service on your device will use this information in accordance with their own terms and privacy policy. Microsoft is not responsible for the data collected by company providing the notification service. If you don\u2019t want to use the notification services for incoming Skype calls and messages, turn it off in the settings found in the Skype application or your device. </p><p><strong>Skype advertising</strong>. Some Skype software includes interest-based advertising, so that you\u2019re more likely to see ads you\u2019ll like. In some versions of the software, you can opt out of interest-based advertising in the privacy options or account settings menu. If you sign in to Skype with a Microsoft account, you can opt out of interest-based advertising at <a target="_blank" class="mscom-link" href="https://choice.microsoft.com">choice.microsoft.com</a>. If you opt out, you\u2019ll still see ads displayed in the Skype software based on your country of residence, language preference, and IP address location, but other data is not used for ad targeting.</p><p><strong>Translation features</strong>. To help you communicate with people in different languages, some Skype apps offer audio and/or text translation features. When you use translation features, your voice and text data are used to provide and improve Microsoft speech recognition and translation services.</p><p><strong>Recording features</strong>. Some versions of Skype have a recording feature that allows you to capture and share audio and/or video clips of your conversation. If you choose to record a session, the recording may include a few seconds of the call held in memory prior to your initiating the recording. The recording will be stored as part of your conversation history and may also be stored locally on your device. <strong><em>You should understand your legal responsibilities before recording any communication. This includes whether you need to get consent from all parties to the communication in advance.</em></strong> Microsoft is not responsible for how you use your recordings or the recording features.</p></span></div><div class="divModuleDescription"><span id="Header">Store</span><span id="navigationHeader">Store</span><span id="moduleName">mainwindowsstoremodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>The Store is an online service that allows you to browse, download, pur chase, rate, and review applications and other digital content. It includes the Windows Store, Xbox Store, and Office Store. </p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>The Store is an online service that allows you to browse, download, purchase, rate, and review applications and other digital content. It includes:</p><ul><li>Windows Store for apps and content for Windows devices such as phones, PCs, and tablets,</li><li>Xbox Store for games and other apps for Xbox ONE and Xbox 360 consoles, and</li><li>Office Store for products and apps for Office, SharePoint, Exchange, Access and Project (2013 versions or later).</li></ul><p>We collect data about how you access and use the Store; the products you\'ve viewed, purchased, or installed; the preferences you set for viewing apps in the Store; and any ratings, reviews or problem reports you submit. Your Microsoft account is associated with your ratings and reviews; and if you write a review, the name and picture from your Microsoft account will be published with your review.</p><p><strong>Permission for Store apps</strong>. Many apps you install from the Windows Store are designed to take advantage of specific hardware and software features of your device. An app\'s use of certain hardware and software features may give the app or its related service access to your data. For example, a photo editing app might access your device\'s camera to let you take a new photo or access photos or videos stored on your device for editing, and a restaurant guide might use your location to provide nearby recommendations. Information about the features that an app uses is provided on the app\'s product description page in the Store. Many of the features that Windows Store apps use can be turned on or off through your device\u2019s privacy settings. In Windows, in many cases, you can choose which apps can use a particular feature. Go to <strong>Start &gt; Settings &gt; Privacy</strong>. Select the feature (for example, Calendar) and select which app permissions are on or off. The lists of apps in Windows privacy settings that can use hardware and software features will not include "Classic Windows" applications, and these applications are not affected by these settings. \r\n </p><p><strong>App updates</strong>. Unless you have turned off automatic app updates in the relevant Store settings, the Store will automatically check for, download, and install app updates to ensure that you have the latest versions. Updated apps might use different Windows hardware and software features from the previous versions, which could give them access to different data on your device. You will be prompted for consent if an updated app accesses certain features, such as location. You can also review the hardware and software features an app uses by viewing its product description page in the Windows Store.</p><p>Each app\'s use of your data collected through any of these features is subject to the app developer\'s privacy policies. If an app available through the Windows Store collects and uses any of your personal data, the app developer is required to provide a privacy policy, and a link to the privacy policy is available on the app\'s product description page in the Store.</p><p><strong>Sideloaded apps and developer mode</strong>. Developer features such as the "developer mode" setting are intended for development use only. If you enable developer features, your device may become unreliable or unusable, and expose you to security risks. Downloading or otherwise acquiring apps from sources other than the Store, also known as "sideloading" apps, may make your device and personal data more vulnerable to attack or unexpected use by apps. Windows policies, notifications, permissions and other features intended to help protect your privacy when apps access your data may not function as described in this statement for sideloaded apps or when developer features are enabled.</p></span></div><div class="divModuleDescription"><span id="Header">SwiftKey</span><span id="navigationHeader">SwiftKey</span><span id="moduleName">mainswiftkeymodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>SwiftKey Keyboard and related apps and services collect and use data about how you type to learn your writing style and provide personalized autocorrect and predictive text that adapts to you.</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>SwiftKey Keyboard and related apps and services use data about how you type \u2013 including the emoji you use and the words that matter to you \u2013 to learn your writing style and provide personalized autocorrect and predictive text that adapts to you.</p><p>When you use our products, we collect data such as device, network, performance, and usage statistics. We use this data to operate and improve the products.</p><p>If you opt in to SwiftKey Cloud, we will collect your email address, basic demographic data, and data about the words and phrases you use to enable services such as personalization, prediction synchronization, and backup. Our prediction technology learns from the way you use language to build a personalized language model. This model is an optimized view of the words and phrases that you use most often, and reflects your unique writing style. To do this, the SwiftKey Keyboard for Android accesses your SMS messages upon first installation. The SwiftKey personalization service, which is a feature of SwiftKey Cloud, also accesses your recent content from online services that you specify, such as Gmail, Facebook and Twitter. If you are logged into SwiftKey Cloud, this data will be transferred over encrypted channels to our servers. Where a field has been flagged by a website or app as denoting a password field or payment data, SwiftKey does not log, store, or learn from this data.</p><p>If you are not logged into SwiftKey Cloud, language insights will not be collected from your device. You may at any time withdraw your consent for our use and retention of personal data collected by SwiftKey by going to the SwiftKey Cloud section in SwiftKey Settings. By withdrawing consent, your personal data collected through your use of the SwiftKey Keyboard will be deleted.</p><p>You may receive occasional notifications on your device alerting you to product updates and features that may be of interest to you. You can disable these notifications in our products at any time by going to the SwiftKey Settings.</p></span></div><div class="divModuleDescription"><span id="Header">Windows</span><span id="navigationHeader">Windows</span><span id="moduleName">mainwindowsmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Windows is a personalized computing environment that enables you to seamlessly roam and access services, preferences and content across your computing devices from phones to tablets to the Surface Hub. Rather than residing as a static software program on your device, key components of Windows are cloud-based, and both cloud and local elements of Windows are updated regularly, providing you with the latest improvements and features. In order to provide this computing experience, we collect data about you, your device, and the way you use Windows. And because Windows is personal to you, we give you choices about the personal data we collect and how we use it. Note that if your Windows device is managed by your organization (such as your employer or school), your organization may use centralized management tools provided by Microsoft or others to control device settings, device policies, software updates, data collection by us or the organization, or other aspects of your device. For more information about data collection and privacy in Windows, go to <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/?LinkId=529552">go.microsoft.com/fwlink/?LinkId=529552</a>. Legacy versions of Windows (including Vista, 7, 8, and 8.1) are subject to their own privacy statements.</p></span></div><div class="divModuleDescription"><span id="Header">Activation</span><span id="navigationHeader">Activation</span><span id="moduleName">mainactivationmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>When you activate Windows, a specific product key is associated with the device on which your software is installed. The product key and data about the software and your device is sent to Microsoft to help validate your license to the software. This data may be sent again if there is a need to re-activate or validate your license. On phones running Windows, device and network identifiers, as well as device location at the time of the first power up of the device, are also sent to Microsoft for the purpose of warranty registration, stock replenishment, and fraud prevention.</p></span></div><div class="divModuleDescription"><span id="Header">Advertising ID</span><span id="navigationHeader">Advertising ID</span><span id="moduleName">mainadvertisingidmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\nWindows generates a unique advertising ID for each user on a device. When the advertising ID is enabled, apps can access and use the advertising ID in much the same way that websites can access and use a unique identifier stored in a cookie. Thus, your advertising ID can be used by app developers (and the advertising networks they work with) to provide more relevant advertising and other personalized experiences across their apps. You can turn off access to this identifier at any time in the device Settings. If you choose to turn it on again, the advertising ID will be reset and a new identifier will be generated. When a third-party app accesses the advertising ID, its use of the advertising ID will be subject to its own privacy policy. For more information on Microsoft\u2019s use of data for advertising, see the <a class="mscom-link" href="#mainhowweusepersonaldatamodule">How We Use Data</a> section of this statement.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Location Services, Motion Sensing, &amp; Recording</span><span id="navigationHeader">Location Services, Motion Sensing, &amp; Recording</span><span id="moduleName">mainlocationservicesmotionsensingmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p><strong>Windows location service.</strong> Microsoft operates a location service that helps determine the precise geographic location of a specific Windows device. Depending on the capabilities of the device, location is determined using satellite global positioning service (GPS), detecting nearby cell towers and/or Wi-Fi access points and comparing that information against a database that Microsoft maintains of cell towers and Wi-Fi access points whose location is known, or deriving location from your IP address. When the location service is active on a Windows device, data about cell towers and Wi-Fi access points and their locations is collected by Microsoft and added to the location database after removing any data identifying the person or device from which it was collected. Microsoft may also share this de-identified location data with third parties to provide and improve location and mapping services.</p><p>Windows services and features (such as browsers and Cortana), applications running on Windows, and websites opened in Windows browsers can access the Windows location service to determine precise location if you allow them to do so. Some features and apps request precise location permission when you first install Windows, some ask the first time you use the app, and others ask every time you access the location service. For information about certain Windows apps that use the location service, see the \r\n <a id="mainwindowsappsmodulefromLocationService" class="mscom-link" href="#mainwindowsappsmodule">Windows Apps</a> section below.\r\n</p><p>When the location service is accessed, your Windows device will also upload its location to Microsoft, and we will retain only the last known location (each new location replaces the previous one) to improve the efficiency and operation of our services. Data about a Windows device\'s recent location history is stored on the device, and certain apps and Windows features can access this location history. You can clear your device\'s location history at any time in the device\'s Settings menu. \r\n</p><p>\r\n In Settings, you can also view which applications have access to the location service or your device\'s location history, turn off or on access to the location service for particular applications, or turn off the location service. You can also set a default location, which will be used when the location service can\u2019t detect a more exact location for your device.\r\n</p><p>Note that on mobile devices, your mobile operator will have access to your location even if you turn off the location service. </p><p><strong>General Location</strong>. If you turn on the General Location feature, apps that cannot use your precise location will have access to your general location, such as your city, postal code, or region.</p><p><strong>Find My Phone.</strong> The Find My Phone feature allows you to find the location of your Windows phone from <a target="_blank" class="mscom-link" href="https://account.microsoft.com/">account.microsoft.com</a>, even if you have turned off all access to the location service on the phone. If you have turned on the "save my location every few hours" feature in the Find My Phone settings on your phone, the Find My Phone feature will periodically send and store a single last known location of your phone, even if you have turned off location services on your phone. Each time a new location is sent, it replaces the previously-stored location.\r\n</p><p><strong>Find My Device.</strong> The Find My Device feature allows\xa0an administrator of a Windows PC or tablet to find the location of that device if the administrator has enabled the location service for the device, even if other users have disabled location for themselves. When the administrator attempts to locate the device, users will see a notification in the notification center.\r\n</p><p><strong>Windows Motion Sensing.</strong> Windows devices with motion activity detection can collect motion activity. This data can enable features such as a pedometer to count the number of steps you take, so a fitness application can estimate how many calories you burn. This data and history is stored on your device and can be accessed by applications you give permission to access and use that data.\r\n</p><p><strong>Recording.</strong> Some Windows devices have a recording feature that allows you to capture audio and video clips of your activity on the device, including your communications with others. If you choose to record a session, the recording will be saved locally on your device. <strong>You\xa0should understand your legal responsibilities before recording any communication. This includes whether you need to get consent from all parties to the communication in advance. </strong>Microsoft is not responsible for how you use recording features or your recordings.\xa0\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Security and Safety Features</span><span id="navigationHeader">Security and Safety Features</span><span id="moduleName">mainsecurityandsafetyfeaturesmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p><strong>Device encryption. </strong>Device encryption helps protect the data stored on your device by encrypting it using BitLocker Drive Encryption technology. When device encryption is on, Windows automatically encrypts the drive Windows is installed on and generates a recovery key. The BitLocker recovery key for your personal device is automatically bac ked up online in your personal Microsoft OneDrive account. Microsoft doesn\'t use your individual recovery keys for any purpose.\xa0\r\n</p><p><strong>Malicious Software Removal Tool.</strong> The Malicious Software Removal Tool (MSRT) runs on your device at least once per month as part of Windows Update. MSRT checks devices for infections by specific, prevalent malicious software ("malware") and helps remove any infections found. When the MSRT runs, it will remove the malware listed on the Microsoft Support website if the malware is on your device. During a malware check, a report will be sent to Microsoft with specific data about malware detected, errors, and other data about your device. If you do not want MSRT to send this data to Microsoft, you can disable MSRT\'s reporting component.\r\n</p><p><strong>Microsoft Family. </strong>Parents can use Microsoft Family to understand and set boundaries on how their child is using their device. There are many features available to Family members, so please carefully review the information provided when you create or join a Family. When Family activity reporting is turned on for a child, Microsoft will collect details about how the child uses their device and provide parents with reports of that child\'s activities. Activity reports are routinely deleted from Microsoft servers after a short period of time.\r\n</p><p><strong>SmartScreen.</strong> SmartScreen helps protect you when using our services by checking downloaded files and web content for malicious software, potentially unsafe web content, and other threats to you or your device. When checking a file, data about that file is sent to Microsoft, including the file name, a hash of the file\'s contents, and the file\'s digital certificates. If SmartScreen identifies the file as unknown or potentially unsafe, you will see a warning prior to opening the file. When checking web content, data about the content is sent to Microsoft, including the full web address of the content. If SmartScreen detects that content is potentially unsafe, you will see a warning in place of the content. SmartScreen can be turned on or off in Settings.\r\n</p><p><strong>Windows Defender.</strong> Windows Defender looks for malware and other unwanted software on your device. Windows Defender is automatically turned on to help protect your device if no other antimalware software is actively protecting your device. If Windows Defender is turned on, it will monitor the security status of your device. When Windows Defender is turned on, or is running because Limited Periodic Scanning is enabled, it will automatically send reports to Microsoft that contain data about suspected malware and other unwanted software, and it may also send files that could contain malware. If a report is likely to contain personal data, the report is not sent automatically and you\'ll be prompted before it is sent. You can configure Windows Defender not to send reports and suspected malware to Microsoft.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Speech, Inking and Typing</span><span id="navigationHeader">Speech, Inking and Typing</span><span id="moduleName">mainspeechinkingtypingmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Microsoft collects and uses data about your speech, inking (handwriting), and typing on Windows devices to help improve and personalize our ability to correctly recognize your input. This feature is also known as Getting to Know You.</p><p>For example, to provide personalized speech recognition, we collect your voice input. If you\u2019ve given permission in Cortana, we also collect your name and nickname, your recent calendar events and the names of the people in your appointments, information about your contacts including names and nicknames, names of your favorite places, apps you use, and information about your music preferences. This additional data enables us to better recognize people, events, places, and music when you dictate commands, messages, or documents.</p><p>Additionally, your typed and handwritten words are collected to provide you a personalized user dictionary, help you type and write on your device with better character recognition, and provide you with text suggestions as you type or write. Typing data includes a sample of characters and words you type, which we scrub to remove IDs, IP addresses, and other potential identifiers. It also includes associated performance data, such as changes you manually make to text as well as words you\'ve added to the dictionary.</p><p>You can turn off Getting to Know You at any time. This will stop the data collection for this feature and will delete associated data stored on your device, such as your local user dictionary and your input history. Because Cortana uses this data to help understand your input, turning off Getting to Know You will also disable speech recognition in Cortana. At <a target="_blank" class="mscom-link" href="https://www.bing.com/account/personalization">https://www.bing.com/account/personalization</a>, you can also sign in with your personal Microsoft account and clear data sent to Microsoft, such as your contacts and calendar data, as well as search and browsing history if your device also had Cortana enabled.</p></span></div><div class="divModuleDescription"><span id="Header">Sync Settings</span><span id="navigationHeader">Sync Settings</span><span id="moduleName">mainsyncsettingsmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\n When you sign into Windows with a Microsoft account, Windows syncs some of your settings and data with Microsoft servers to make it easier to have personalized experiences across multiple devices. After you\'ve signed into one or more devices with a Microsoft account, when you sign into another with the same Microsoft account for the first time, Windows will download and apply the settings and data you choose to sync from your other devices. Settings you choose to sync will automatically update on Microsoft servers and your other devices as you use them.\r\n</p><p>Some of the settings that are synced include:</p><ul><li>Apps you\'ve installed from the Windows Store </li><li>Language preferences </li><li>Ease of Access preferences </li><li>Personalization settings such as your account picture, background, and mouse settings </li><li>Settings for Windows Store apps </li><li>Spell checker dictionaries, input method editor (IME) dictionaries, and personal dictionaries </li><li>Internet Explorer browser history, favorites, and websites you have open </li><li>Saved app, website, mobile hotspot, and Wi-Fi network names and passwords </li></ul><p>\r\n You can choose whether to sync your settings, and control what is synced, by going to Sync Settings in the Accounts section of Windows Settings. Some apps have their own, separate sync controls. If you sign into Windows with a work account and you choose to connect that account to your personal Microsoft account, Windows will ask which settings you want to sync before connecting your Microsoft account. \r\n</p></span></div><div class="divModuleDescription"><span id="Header">Telemetry &amp; Error Reporting</span><span id="navigationHeader">Telemetry &amp; Error Reporting</span><span id="moduleName">maintelemetryerrorreportingmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>As you use Windows, we collect diagnostic and usage data that helps us identify and troubleshoot problems, improve our products and services, and provide you with personalized experiences. This data is transmitted to Microsoft and stored with one or more unique identifiers that can help us recognize an individual user on an individual device and understand the device\'s service issues and use patterns. There are three levels of diagnostic and usage data: <strong>Full</strong>, <strong>Enhanced</strong> and <strong>Basic</strong>. You can select which level of diagnostic and usage data to provide, but some diagnostic data is vital to the operation of Windows and cannot be turned off.</p><p>During Windows setup, opting to "Send full error and diagnostic reporting to Microsoft" sets your <strong>Diagnostic and usage data</strong> setting to <strong>Full</strong>. If you don\u2019t choose to "Send full error and diagnostic reporting to Microsoft," <strong>Diagnostic and usage data</strong> collection will be set to <strong>Enhanced</strong>. You can adjust your Diagnostic and usage data collection level at any time in <strong>Settings</strong>. We recommend that you select <strong>Full</strong> for the best Windows experience and the most effective troubleshooting.</p><p><strong>Basic</strong> data is data that is vital to the operation of Windows. This data helps keep Windows and apps secure, up-to-date, and running properly by letting Microsoft know the capabilities of your device, what is installed, and whether Windows is operating correctly. This option also includes basic error reporting back to Microsoft. Basic data includes:</p><ul><li>Configuration data, including the manufacturer of your device, model, number of processors, display size and resolution, date, region and language settings, and other data about the capabilities of the device. </li><li>The software (including drivers and firmware supplied by device manufacturers), installed on the device.</li><li>Performance and reliability data, such as which programs are launched on a device, how long they run, how quickly they respond to input, how many problems are experienced with an app or device, and how quickly information is sent or received over a network connection.</li><li>Network and connection data, such as the device\u2019s IP address, number of network connections in use, and data about the networks you connect to, such as mobile networks, Bluetooth, and connection requirements and speed of Wi-Fi networks you connect to. </li><li>Other hardware devices connected to the device.</li></ul><p><strong>Enhanced</strong> data includes all <strong>Basic</strong> data plus data about how you use Windows, including Microsoft and third party software (apps, drivers, etc.) that runs on Windows. This data includes how you use certain features or apps and for how long, which apps and features you use most often, how often you use Windows Help and Support, which services you use to sign into apps, and identifiers related to the wireless networks you connect to (BSSID and SSID). This option also lets us collect diagnostic data related to system or app crashes. If you select this option, we\'ll also be able to provide you with an enhanced and more personalized Windows experience. </p><p><strong>Full</strong> data includes all <strong>Basic</strong> and <strong>Enhanced</strong> data, plus additional diagnostic data including the memory state of your device when a system or app crash occurs (which may unintentionally include parts of a document you were using when a problem occurred). It also turns on advanced diagnostic features that can collect additional data from your device, which helps us further troubleshoot and fix problems. When devices experience problems that are difficult to diagnose or replicate with Microsoft\'s internal testing, Microsoft will randomly select a small number of devices, from those at the Full level and exhibiting the problem, from which to gather all of the data needed to diagnose and fix the problem (including user content that may have triggered the issue). If an error report contains personal data, we won\u2019t use that information to identify, contact, or target advertising to you.</p><p>Windows error reports help Microsoft and Microsoft partners diagnose problems in the software you use and provide solutions. We provide limited portions of error report information to partners (such as OEMs) to help them troubleshoot products and services which work with Windows and other Microsoft product and services. They are only permitted to use this information to repair or improve those products and services. </p></span></div><div class="divModuleDescription"><span id="Header">Update Services</span><span id="navigationHeader">Update Services</span><span id="moduleName">mainupdateservicesmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\n Update Services for Windows includes Windows Update and Microsoft Update. Windows Update is a service that provides you with software updates for Windows software and other supporting software, such as drivers and firmware supplied by device manufacturers. Microsoft Update is a service that provides you with software updates for other Microsoft software such as\xa0<a class="mscom-link" href="#mainofficemodule">Office</a>.\r\n</p><p>\r\n Windows Update automatically downloads Windows software updates to your device. You can configure Windows Update to automatically install these updates as they become available (recommended) or have Windows notify you when a restart is required to finish installing updates. Apps available through the Windows Store are automatically updated through the Store, as described in the\xa0<a id="mainwindowsstoremodulefromUpdateServices" class="mscom-link" href="#mainwindowsstoremodule">Store</a> section above.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Web Browsers: Microsoft Edge and Internet Explorer</span><span id="navigationHeader">Web Browsers: Microsoft Edge and Internet Explorer</span><span id="moduleName">mainwebbrowsersmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Microsoft Edge is Microsoft\'s default web browser for Windows. Internet Explorer, Microsoft\'s legacy browser, is also available in Windows. Whenever you use a web browser to access the Internet, data about your device ("standard device data") is sent to the websites you visit and online services you use. Standard device data includes your device\'s IP address, browser type and language, access times, and referring website addresses. This data might be logged on those websites\' web servers. Which data is logged and how that data is used depends on the privacy practices of the websites you visit and web services you use. </p><p>Additionally, data about how you use your browser, such as your browsing history, web form data, temporary Internet files, and <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">cookies</a>, is stored on your device. You can delete this data from your device using Delete Browsing History. </p><p>New features in Microsoft Edge allow you to capture and save content on your device, such as:</p><ul><li><strong>Web Note</strong>: which allows you to create ink and text annotations on the web pages you visit, and clip, save or share them; </li><li><strong>Active Reading</strong>: which allows you to create and manage reading lists including websites or documents; and </li><li><strong>Hub</strong>: which allows you to easily manage your reading lists, favorites, downloads, and history all in one area. </li></ul><p>\r\n Some Microsoft browser information saved on your device will be synced across other devices when you sign in with your Microsoft account. For instance, in Internet Explorer, this information includes your browsing history and favorites; and in Microsoft Edge, it includes your favorites and reading lists. As an example, if you sync your Microsoft Edge reading list across devices, copies of the content you choose to save to your reading list will be sent to each synced device for later viewing. You can disable syncing in Internet Explorer by going to Sync Settings in the Accounts section of Windows Settings (see\r\n <a id="mainsyncsettingsmodulefromWeb" class="mscom-link" href="#mainsyncsettingsmodule">Sync Settings</a>). You can also disable syncing of Microsoft Edge browser information by turning off the sync option in Microsoft Edge Settings.\r\n</p><p>Microsoft Edge and Internet Explorer use your search queries and browsing history to provide you with faster browsing a nd more relevant search results. These features include:</p><ul><li><strong>AutoSearch and Search Suggestions</strong> in Internet Explorer automatically sends the information you type into the browser address bar to your default search provider (such as Bing) and offer search recommendations as you type each character. In Microsoft Edge, this feature automatically sends this information to Bing even if you have selected another default search provider.\r\n </li><li><strong>Page Prediction</strong> sends your browsing history to Microsoft and uses aggregated browsing history data to predict which pages you are likely to browse to next\xa0and proactively loads those pages in the background for a faster browsing experience.\r\n </li><li><strong>Suggested Sites</strong> recommends web contents that you might be interested in based on your search and browsing history.\xa0\r\n </li></ul><p>Browsing data collected in connection with these features is used in the aggregate and you can turn off any of these features at any time. These features will not collect browsing history while you have InPrivate Browsing enabled.</p><p>\r\n In order to provide search results, Microsoft Edge and Internet Explorer send your search queries, standard device information, and location (if you have location enabled) to your default search provider. If Bing is your default search provider, we use this data as described in the\xa0<a class="mscom-link" href="#mainbingmodule">Bing</a> section of this privacy statement.\r\n</p><p>\r\n Cortana can assist you with your web browsing in Microsoft Edge with features such as Ask Cortana. You can disable Cortana assistance in Microsoft Edge at any time in Microsoft Edge Settings. Separately, if you enable Cortana to use your browsing history in Cortana Permissions, Microsoft will collect your Microsoft Edge search queries and full browsing history, associated with a user ID. Cortana and related Microsoft products will use this data to learn about you and provide you with timely and intelligent answers and proactive personalized suggestions, or to complete web tasks for you. You can disable Cortana\u2019s access to your browsing history at any time in Cortana Permissions. To learn more about how Cortana uses data and how you can control that, go to the <a class="mscom-link" href="#maincortanamodule">Cortana</a> section of this privacy statement.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Wi-Fi Sense</span><span id="navigationHeader">Wi-Fi Sense</span><span id="moduleName">mainwi-fisensemodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Wi-Fi Sense allows you to automatically connect to Wi-Fi networks around you to help you save cellular data and give you more connection options. If you turn it on, you will automatically connect to open Wi-Fi networks. Please note that not all open networks are secure - be careful using an open network to do something online that requires sensitive or personal data, such as making a banking transaction or a purchase.</p></span></div><div class="divModuleDescription"><span id="Header">Windows Apps</span><span id="navigationHeader">Windows Apps</span><span id="moduleName">mainwindowsappsmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>A number of Microsoft apps are included with Windows and others are available in the Windows Store. Some of those apps include:</p><p><strong>Maps app.</strong> The Maps app provides location-based services and uses Bing services to process your searches within the Maps app. Please see the\r\n <a class="mscom-link" href="#mainbingmodule">Bing</a>\xa0section of this privacy statement to learn more about these Bing-powered experiences. When the Maps app has access to your location, even when the app is not in use, Microsoft may collect de-identified location data from your device to improve Microsoft\'s services. You can disable the Maps app\'s access to your location by turning off the location service or turning off the Maps app\'s access to the location service.\r\n</p><p>\r\n You can keep track of your favorite places and recent map searches in the Maps app. Your favorite places and search history will be included as search suggestions. If you\'re signed in with your Microsoft account, your favorite places, search history, and certain app settings will be synced across other devices and services (for example, Cortana). See <a id="mainsyncsettingsmodulefromWindowsApp" class="mscom-link" href="#mainsyncsettingsmodule">Sync Settings</a>\xa0above for more information.\r\n</p><p><strong>Camera and Photo apps.</strong> If you allow the Camera app to use your location, location data is embedded in the photos you take with your device. Other descriptive data, such as camera model and the date that the picture was taken, is also embedded in photos and videos. If you choose to share a photo or video, any embedded data will be accessible to the people and services you share with. You can disable the Camera app\'s access to your location by turning off all access to the location service in your device\'s Settings menu or turning off the Camera app\'s access to the location service.\r\n</p><p>\r\n Your photos, videos, as well as screenshots, saved in your camera roll automatically upload to OneDrive. You can manage your photos and/or videos in OneDrive, and you can disable the automatic upload in Settings.\r\n</p><p>\r\n When you take photos embedded with your location, the Photos app can group your photos by time and location. To group your photos, the Photos app sends location data in your photos to Microsoft to determine the names of locations, such as "Seattle, Washington". When you are using the Photo app while signed into your Microsoft account, your photos and videos from OneDrive will be automatically sorted in into albums in the Photo app, and will also appear on the Photo app\'s live tile. Your photos and/or videos will only be shared with others if you choose to do so.\r\n</p><p><strong>People app.</strong> The People app lets you see and interact with all your contacts in one place. When you add your Microsoft account to a Windows device, your contacts from your account will be automatically added to the People app. You can add other accounts to the People app, including your social networks (such as Facebook and Twitter) and email accounts. When you add an account, we tell you what data the People app can import or sync with the particular service and let you choose what you want to add. Other apps you install may also sync data to the People app, including providing additional details to existing contacts. You can remove an account from the People app at any time. \r\n</p><p><strong>Mail and Calendar app.</strong> The Mail and Calendar app allows you to connect all your email, calendars, and files in one place, including those from third-party email and file storage providers. The app provides location-based services, such as weather information in your calendar, but you can disable the app\u2019s use of your location. When you add an account to the Mail and Calendar app your email, calendar items, files, contacts, and other settings from your account will automatically sync to your device and to Microsoft\u2019s servers. At any time, you can remove an account or make changes to the data that\u2019s synced from your account. To configure an account, you must provide the app with the account credentials (such as user name and password), which will be sent over the Internet to the third-party provider\'s server. The app will first attempt to use a secure (SSL) connection to configure your account but will send this information unencrypted if your email provider does not support SSL. If you add an account provided by an organization (such as a company email address), the owner of the organizational domain can implement certain policies and controls (for example, multi-factor authentication or the ability to remotely wipe data from your device) that may affect your use of the app. </p><p><strong>Messaging app.</strong> When you sign in with a Microsoft account on your device, you can choose to back up your information, which will sync your SMS and MMS messages and store them in your Microsoft account. This allows you to retrieve the messages if you lose or change phones. After your initial device set-up, you can manage your messaging settings at any time. Turning off your SMS/MMS backup will not delete messages that have been previously backed up to your Microsoft account. To delete such messages from storage, you must delete them from your device prior to turning off backup. If you allow the Messaging app to use your location, you can attach a link to your current location to an outgoing message. Location information will be collected by Microsoft as described in the Windows <a id="mainsyncsettingsmodulefromWindowsApp" class="mscom-link" href="#mainlocationservicesmotionsensingmodule">Location Services</a> section.\r\n</p><p><strong>Microsoft Wallet.</strong> You can use Microsoft Wallet to hold information such as coupons, loyalty cards, tickets, and other digital content. Where available, you can also add payment cards to the Microsoft Wallet to make payments at participating stores using NFC (near-field communication).</p><p>You can set up your wallet for payment by logging into Microsoft Wallet with your personal Microsoft account and adding payment cards associated with your Microsoft account. When you add a payment card to Microsoft Wallet, we provide data to your bank and payment card network, including your name, card number, billing address, email address, device data (including the device name, type, and identifier), and your location at the time you add your payment card to your wallet. This data is sent to your bank and payment card network to determine the eligibility of your payment card, enable transactions, detect fraud.</p><p>When you make an NFC payment, Microsoft Wallet will provide the merchant with an encrypted version of your payment card (a \u201ctoken\u201d). The merchant will present this token, along with transaction details, to your bank to complete the transaction and request payment for your transaction.</p></span></div><div class="divModuleDescription"><span id="Header">Windows Hello</span><span id="navigationHeader">Windows Hello</span><span id="moduleName">mainwindowshellomodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>\r\nWindows Hello provides instant access to your devices through biometric authentication.\xa0 If you turn it on, Windows Hello uses your face, fingerprint or iris to identify you based on a set of unique points or features that are extracted from the image and stored on your device as a template - but it does not store the actual picture or image of your face or iris. Biometric verification data that\'s used when you sign in doesn\'t leave your device. You can delete your biometric verification data from within Settings.\t\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Windows Search</span><span id="navigationHeader">Windows Search</span><span id="moduleName">mainwindowssearchmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Windows Search lets you search your stuff and the web from one place. If you choose to use Windows Search to search "your stuff", it will provide results for items on your OneDrive as well as on your device. If you choose to use Windows Search to search the web, or get search suggestions with Windows Search or Cortana, your search results will be powered by Bing and we will use your search query as described in the <a class="mscom-link" href="#mainbingmodule">Bing</a>\xa0section of this privacy statement.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Xbox</span><span id="navigationHeader">Xbox</span><span id="moduleName">mainxboxmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Xbox Live is Microsoft\'s online gaming and entertainment service and social network. Xbox services can be accessed from a variety of devices, including Xbox consoles, PCs (including via xbox.com and the Xbox app), and mobile devices. Microsoft collects data about your use of Xbox services, which can include information collected by the Kinect sensor. Some data, such as your gamertag and game scores, can be seen by other users.</p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>\r\n Xbox consoles are hardware devices that you can use to access and play games, movies, music, and other forms of digital entertainment. Xbox Live (including Games for Windows Live) is Microsoft\'s online gaming and entertainment service and social network. It provides ways for you to connect with your friends on Xbox Live and other gaming and social networks. Xbox services can be accessed from a variety of devices, including Xbox consoles, PCs (including via xbox.com and the Xbox app), and mobile devices.\r\n</p><p>We collect data about your use of Xbox services, such as:</p><ul><li>When you sign in and sign out, the games you play, your game and score statistics, and the purchases you make and content you obtain. </li><li>Performance data about the Xbox services, your device and your network connection, including any hardware or software errors that occur. </li><li>If you use the Xbox console with Kinect, data about how you use Kinect. See below for more information about Kinect data collection. </li></ul><p>\r\n All such data is stored with the Xbox console\'s unique identifier and associated with your personal data. When your Xbox is connected to the Internet, we identify which console and which version of the Xbox operating system you are currently using.\r\n</p><p>\r\n With your consent, we will collect information about videos you purchase or view through third-party apps on your Xbox console. If you use the Xbox TV app, we collect TV viewing history from your console in a way that doesn\'t identify you or others.\r\n</p><p>\r\n If you use an Xbox console that includes a storage device (hard drive or memory unit), and if you play offline or have never signed into the services on the console, usage data will be stored on the storage device and sent to Microsoft the next time you sign into the services.\r\n</p><p><strong>Xbox Live data viewable by other users. </strong>Your gamertag (Xbox live nickname), game and score statistics, achievements, presence (whether you\'re signed into Xbox Live), and other data about your activity on Xbox Live can be seen by other users on Xbox Live or other properties associated with Xbox Live (including those of partner companies). For example, your gamertag and scores that show on game leaderboards are considered public and can\'t be hidden. For other types of data, you can adjust your privacy settings on the console or at\r\n <a target="_blank" class="mscom-link" href="https://www.xbox.com/">xbox.com</a> to limit or block the sharing with other users.\r\n</p><p><strong>Xbox Live data shared with game or app publishers. </strong>When you use an Xbox Live-enabled game or app, the publisher or service provider for that game or app has access to data about your usage of Xbox Live and that game or app, and may disclose or display (such as on leaderboards) such data. This data includes, for example, your game scores, data about your game play sessions (for example, types of vehicles used in the game), your presence on Xbox Live, the time you spend playing the game or app, rankings, statistics, gamer profiles, avatars, and other content that you may create or submit within the game or app.\r\n</p><p><strong>Linking your Xbox Live account to non-Microsoft accounts.</strong> Some of the games or apps found on Xbox Live are delivered by partner companies, which may require that you create a non-Microsoft account and sign-in credentials to use that game or app. If you choose to link your Microsoft account with your account with a partner company, Microsoft will share limited account information with that company. Such account information can include name, address, email and date of birth but will not include any credit card or other payment information. For games that enable in-game communications, the game publisher will also have access to the content of in-game communications when you are signed into your account with the publisher.\r\n</p><p><strong>Kinect.</strong> The Kinect sensor is a combination of camera, microphone, and infrared sensor that can enable motions and voice to be used to control gameplay and to navigate through the service. For example:\r\n</p><ul><li>If you choose, the camera can be used to sign you into the service automatically using facial recognition. To do this it takes an image of your face and measures distances between key points to create and store a numeric value that represents only you. This data stays on the console and is not shared with anyone, and you can choose to delete this data from your console at any time.</li><li>For gameplay, Kinect will map distances between your body\'s joints to create a stick figure representation of you that helps Kinect enable gameplay. If you are playing online, we collect those numeric values to enable and improve gameplay and the gaming experience. Kinect also detects specific hand gestures intended to do simple system interactions (such as menu navigation, pan/zoom and scroll). </li><li>For some fitness games, Xbox can use the Kinect sensor to estimate your exercise data, including estimates such as your heart rate during a certain activity or the number of calories burned during a workout. </li><li>Kinect\'s microphones enable voice chat between players during gameplay. They also enable voice commands for control of the console, game or app,\xa0or to enter search terms. See below for additional details on voice data collection. </li><li>The Kinect sensor can also be used for audio and video communications through services such as\r\n <a class="mscom-link" href="#mainskypemodule">Skype</a>. </li></ul><p>\r\n To learn more about Kinect, for Xbox 360, see\r\n <a target="_self" class="mscom-link" href="https://privacy.microsoft.com/kinect-and-xbox-360-privacy">Kinect and Xbox 360 privacy</a>. For Xbox One, see\r\n <a target="_self" class="mscom-link" href="https://privacy.microsoft.com/kinect-and-xbox-one-privacy">Kinect and Xbox One Privacy</a>.\r\n</p><p><strong>Captioning.</strong> During Xbox real-time chat, players may activate a voice-to-text feature, which allows the user to view the audio in-game chat as text. If a user activates this feature, the other players will have no additional notice. Microsoft uses this data to provide captioning of chat for users who need it. We also use this data to improve our ability to provide the service and other, similar voice-based services.</p><p><strong>Communications\xa0monitoring.</strong> Xbox Live includes communications features such as text-based messaging and online voice chat between players during gameplay. In order to help provide a safe gaming environment and enforce the\r\n <a target="_blank" class="mscom-link" href="https://www.xbox.com/legal/codeofconduct">Microsoft Code of Conduct</a>, we will collect, review, and monitor a sample of these communications, including Xbox Live game chats and party chat communications in live-hosted multiplayer gameplay sessions offered through the services.\r\n</p><p><strong>Voice data for service improvement. </strong>We collect, and use for service improvement, voice search requests or samples of voice commands\xa0occurring while using Kinect.\xa0These data are stored separately from your Xbox profile.\r\n</p><p><strong>GameDVR.</strong> Any player in a multiplayer game session can use GameDVR to record their view of the gameplay taking place in that session. The recording can capture your in-game character and gamertag in the game clips created by other players in the gameplay session. Note that if a player uses GameDVR on a PC, audio chat may also be captured in a game clip. Microsoft can review game clips for violations of the\r\n <a target="_blank" class="mscom-link" href="https://www.xbox.com/legal/codeofconduct">Microsoft Code of Conduct</a>, even if your game clip sharing setting is set to Block.\r\n</p><p><strong>Xbox Live Rewards.</strong> Xbox Live Rewards, available at\r\n <a target="_blank" class="mscom-link" title="rewards.xbox.com" href="https://rewards.xbox.com/">rewards.xbox.com</a>, is a program you can join to receive Xbox credits for being active on the services. You must agree to receive promotional communications from the Rewards program as a condition of joining. You sign into Rewards using your Microsoft account, and the program collects personal data including first name, last name, gamertag, and demographic information. The program is hosted and operated by HelloWorld, a Microsoft vendor. The data collected is stored by the vendor on behalf of Microsoft. You can review and edit the personal data you provided to the Rewards program by contacting\r\n <a target="_blank" class="mscom-link" href="mailto:privacy@helloworld.com">privacy@helloworld.com</a>.\r\n</p><p><strong>Children and online safety. </strong>If you have children who use Xbox services, you can set up child accounts for them. Children 17 and younger cannot create an account on Xbox Live without parental consent. Adults in the family can change consent choices and online safety settings for child accounts on\r\n <a target="_blank" class="mscom-link" href="https://www.xbox.com/">xbox.com</a>.\r\n</p></span></div><div class="divModuleDescription"><span id="Header">Enterprise Products</span><span id="navigationHeader">Enterprise Products</span><span id="moduleName">mainenterpriseservicesmodule</span><div class="printsummary" style="display: block;">Summary</div><span class="Description" id="ShortDescription"><p>Enterprise Products are those Microsoft products and related offerings that are offered or designed primarily for use by organizations and developers. They include subscription cloud services, such as Office 365, Microsoft Azure, Microsoft Dynamics CRM Online, Microsoft Intune, and Yammer, for which an organization (our "customer") contracts with Microsoft for the services (\u201cOnline Services\u201d). They also include server and developer products customers run on their own premises, such as Windows Server, SQL Server, Visual Studio, and System Center (\u201cOn-Prem Products\u201d). Microsoft Cognitive Services are not Enterprise Products under this privacy statement.</p><p>Some Enterprise Products have their own, separate privacy statements. The following notices explain specific privacy practices with respect to certain Microsoft products you may use:</p><ul><li><a target="_self" class="mscom-link" href="https://go.microsoft.com/fwlink/p/?linkid=824704">Enterprise and developer</a></li><li><a target="_self" class="mscom-link" href="https://go.microsoft.com/fwlink/p/?LinkId=512132">Online services</a></li></ul><p><strong>In the event of a conflict between a Microsoft privacy statement the terms of any agreement(s) between a customer and Microsoft, the terms of those agreement(s) will control.</strong></p></span><div class="printDetailedContent" style="display: block;">Full text</div><span class="Description" id="LongDescription"><p>Enterprise Products are those Microsoft products and related offerings that are offered or designed primarily for use by organizations and developers. They include subscription cloud services, such as Office 365, Microsoft Azure, Microsoft Dynamics CRM Online, Microsoft Intune, and Yammer, for which an organization (our "customer") contracts with Microsoft for the services (\u201cOnline Services\u201d). They also include server and developer products customers run on their own premises, such as Windows Server, SQL Server, Visual Studio, and System Center (\u201cOn-Prem Products\u201d). Microsoft Cognitive Services are not Enterprise Products under this privacy statement.</p><p>Some Enterprise Products have their own, separate privacy statements. The following notices explain specific privacy practices with respect to certain Microsoft products you may use:</p><ul><li><a target="_self" class="mscom-link" href="https://go.microsoft.com/fwlink/p/?linkid=824704">Enterprise and developer</a></li><li><a target="_self" class="mscom-link" href="https://go.microsoft.com/fwlink/p/?LinkId=512132">Online services</a></li></ul><p><strong>In the event of a conflict between a Microsoft privacy statement the terms of any agreement(s) between a customer and Microsoft, the terms of those agreement(s) will control.</strong></p><p>When a customer purchases or subscribes to Enterprise Products, or obtains support for such products, Microsoft collects data to provide the best experiences with our products, operate our business, and communicate with the customer. For example:</p><ul><li>When a customer engages with a Microsoft sales representative, we collect the customer\u2019s name and contact data, along with information about the organization, to support that engagement.</li><li>When a customer interacts with a Microsoft support professional, we collect support data or error reports to diagnose and resolve problems.</li><li>When a customer pays for products, we collect contact and payment data to process the payment.</li><li>When a customer receives communications for Microsoft, we use data to personalize the content of the communication.</li></ul><p>Our customers, in turn, may administer the Enterprise Products to end users. If you use a work or school account (i.e. an email address provided by your organization, such as your employer or school) to sign into Enterprise Products, the owner of the domain associated with your email address may: (i) control and administer your account and (ii) access and process your data, including the contents of your communications and files. Microsoft is not responsible for the privacy or security policies or practices of our customers, which may differ from those of Microsoft. If your organization is administering your use of the Enterprise Products, please direct your privacy inquiries to your administrator.</p><p><strong>Online Services</strong>. The Online Services collect Customer Data and Administrator Data. "Customer Data" means all data, including all text, sound, video, or image files, and software, that are provided to Microsoft by, or on behalf of, you or your end users through use of the Online Service. Customer Data is used only to provide the customer the Online Services including purposes compatible with providing those services. For example, we may use Customer Data to provide a personalized experience, improve service reliability, combat spam or other malware, or improve features and functionality of the Online Services. Microsoft will not use Customer Data or derive information from it for any advertising or similar commercial purposes. For more information about the features and functionality that enable you to control Customer Data, please review documentation specific to the Online Service. To learn more about Microsoft\u2019s handling of Customer Data, including information about how we handle data access requests and security, please see\r\n <a target="_blank" class="mscom-link" href="https://go.microsoft.com/fwlink/p/?LinkId=512132">Microsoft Online Services Terms</a>.</p><p>\u201cAdministrator Data\u201d is data provided to Microsoft during sign-up, purchase, or administration of the Online Services. Administrator Data includes the name, address, phone number, and email address you provide, as well as aggregated usage data related to your account, such as the controls you select. We use Administrator Data to provide the Online Services, complete transactions, service the account, and detect and prevent fraud. Administrator Data may also include contact information of your colleagues and friends if you agree to provide it to Microsoft for the limited purpose of sending them an invitation to use the Online Services; we may contact those individuals with communications that may include information about you, such as your name and profile photo.</p><p>As needed, we use Administrator Data to contact you to provide information about your account, subscriptions, billing, and updates to the Online Services, including information about new features, security or other technical issues. We may also contact you regarding third-party inquiries we receive regarding use of the Online Services, as described in your agreement. You will not be able to unsubscribe from these non-promotional communications. Subject to your contact preferences, we may also contact you regarding information and offers about other products and services, or share your contact information with Microsoft\'s partners. You may manage your contact preferences or update your information in your account profile.</p><p>When you use social features of the Online Services, other users in your network may see some of your activity. To learn more about the social features and other functionality, please review documentation specific to the Online Service.</p><p>The Online Services enable you to purchase, subscribe to or use other Microsoft products. Please be sure to read the product-specific details for each product you use to understand how each products\u2019 privacy practices may differ.</p><p><strong>On-Prem Products</strong>. On-Prem Products collect data to operate effectively and provide you the best experiences. The data we collect depends on the features you use, but it is generally limited to usage data. Customers have choices about the data they provide. For example:</p><ul><li>During installation or when you upgrade an On-Prem Product, we may collect use and performance data to learn whether you experience any difficulties.</li><li>When you use On-Prem Products, we may collect device data to learn about your operating environment to improve security features.</li><li>When you experience a crash, you may choose to send Microsoft an error report to help us diagnose the problem and deliver customer support.</li></ul><p>Microsoft uses the data we collect from On-Prem Products to provide and improve our products, to deliver customer support, to activate the product, to communicate with you, and to operate our business.</p></span></div></div><div class="displayNone" id="dvGroupModules"><span id="spn_mainotherimportantprivacyinformationmodule">\r\n mainsecurityofpersonaldatamodule,mainwherewestoreandprocessdatamodule,mainourretentionofpersonaldatamodule,maincollectionofdatafromchildrenmodule,mainpreviewreleasesmodule,mainchangestothisprivacystatementmodule,mainhowtocontactusmodule\r\n </span><span id="spn_mainmicrosofthealthservicesmodule">\r\n mainmicrosofthealthandbandmodule,mainhealthvaultmodule\r\n </span><span id="spn_mainwindowsmodule">\r\n mainactivationmodule,mainadvertisingidmodule, mainlocationservicesmotionsensingmodule,mainsecurityandsafetyfeaturesmodule, mainspeechinkingtypingmodule, mainsyncsettingsmodule,maintelemetryerrorreportingmodule,mainupdateservicesmodule, mainwebbrowsersmodule,mainwi-fisensemodule,mainwindowsappsmodule, mainwindowshellomodule,mainwindowssearchmodule\r\n </span></div><div class="displayNone" id="dvServicesAgreement">mainbingmodule</div></div><div class="row show-s hide-m"><div class="col-1-2"><div class="gcc_cookies m-b-lg"><div class="gcc_cookiesHeadergb caption-2"><span id="gcc_cookiesHeaderText">Cookies</span></div><div class="gcc_cookiesContent caption"><p>Most Microsoft Sites use "cookies," small text files that can be read by a web server in the domain that put the cookie on your hard drive. We may use cookies to store your preferences and settings; help with sign-in; provide targeted ads; and analyze site operations. <a class="mscom-link" href="#maincookiessimilartechnologiesmodule">Click here to learn more.</a></p></div></div></div><div class="col-1-2"><div class="logo_relatedLink_S ection caption m-t-lg m-b-lg"><p><a title="FTC Privacy Initiatives" class="relatedLinks" id="MorePrivacyLink2" href="http://www.consumer.ftc.gov/topics/privacy-identity" target="_blank">Privacy Tips from the FTC</a></p></div><div class="gcl_safelogo m-b-lg"><div class="selfCertify caption m-b-md"><a id="psp_we_self_certify_compliance_with_small_screen" href="https://safeharbor.export.gov/list.aspx" target="_blank"></a></div><a href="http://export.gov/safeharbor/" target="_blank"><img src="https://c.s-microsoft.com/en-us/CMSImages/SafeHarbor.png?version=82204c88-ced3-50a2-eae5-11ff5aef0edd" class="mscom-image" alt="safeharbo" title="safeharbor" width="153" height="60"></a></div></div></div></div></div></div></div></div>'} DEBUG:scrapy.core.engine:Crawled (200) <GET https://telegram.org/privacy> (referer: None) 2017-02-26 16:56:20 [scrapy] DEBUG: Crawled (200) <GET https://telegram.org/privacy> (referer: None) INFO:scrapy.core.engine:Closing spider (finished) 2017-02-26 16:56:20 [scrapy] INFO: Closing spider (finished) DEBUG:page_watcher_scraper.pipelines:closing policy file 2017-02-26 16:56:20 [page_watcher_scraper.pipelines] DEBUG: closing policy file INFO:scrapy.statscollectors:Dumping Scrapy stats: {'downloader/request_bytes': 242, 'downloader/request_count': 1, 'downloader/request_method_count/GET': 1, 'downloader/response_bytes': 204585, 'downloader/response_count': 1, 'downloader/response_status_count/200': 1, 'finish_reason': 'finished', 'finish_time': datetime.datetime(2017, 2, 26, 16, 56, 20, 482700), 'item_scraped_count': 1, 'log_count/CRITICAL': 6, 'log_count/DEBUG': 79, 'log_count/INFO': 40, 'response_received_count': 1, 'scheduler/dequeued': 1, 'scheduler/dequeued/memory': 1, 'scheduler/enqueued': 1, 'scheduler/enqueued/memory': 1, 'start_time': datetime.datetime(2017, 2, 26, 16, 56, 16, 419999)} 2017-02-26 16:56:20 [scrapy] INFO: Dumping Scrapy stats: {'downloader/request_bytes': 242, 'downloader/request_count': 1, 'downloader/request_method_count/GET': 1, 'downloader/response_bytes': 204585, 'downloader/response_count': 1, 'downloader/response_status_count/200': 1, 'finish_reason': 'finished', 'finish_time': datetime.datetime(2017, 2, 26, 16, 56, 20, 482700), 'item_scraped_count': 1, 'log_count/CRITICAL': 6, 'log_count/DEBUG': 79, 'log_count/INFO': 40, 'response_received_count': 1, 'scheduler/dequeued': 1, 'scheduler/dequeued/memory': 1, 'scheduler/enqueued': 1, 'scheduler/enqueued/memory': 1, 'start_time': datetime.datetime(2017, 2, 26, 16, 56, 16, 419999)} INFO:scrapy.core.engine:Spider closed (finished) 2017-02-26 16:56:20 [scrapy] INFO: Spider closed (finished) DEBUG:policies:in handle response 2017-02-26 16:56:20 [policies] DEBUG: in handle response DEBUG:policies:wroten log ok /app/log/2017-02-26T16-56-16_ok_url.log 2017-02-26 16:56:20 [policies] DEBUG: wroten log ok /app/log/2017-02-26T16-56-16_ok_url.log DEBUG:page_watcher_scraper.util:{'item': 'telegram.org_privacy', 'name': 'policies', 'time': '2017-02-26T16-56-20'} 2017-02-26 16:56:20 [page_watcher_scraper.util] DEBUG: {'item': 'telegram.org_privacy', 'name': 'policies', 'time': '2017-02-26T16-56-20'} DEBUG:page_watcher_scraper.util:saving html /app/html/2017-02-26T16-56-20-policies-telegram.org_privacy.html 2017-02-26 16:56:20 [page_watcher_scraper.util] DEBUG: saving html /app/html/2017-02-26T16-56-20-policies-telegram.org_privacy.html DEBUG:page_watcher_scraper.pipelines:writing policy to file /app/page-watcher-data/telegram/telegram/privacy_policy.txt 2017-02-26 16:56:20 [page_watcher_scraper.pipelines] DEBUG: writing policy to file /app/page-watcher-data/telegram/telegram/privacy_policy.txt DEBUG:scrapy.core.scraper:Scraped from <200 https://telegram.org/privacy> {'content': u'<div class="tl_page">\n <div id="dev_page_content_wrap" class=" ">\n <div class="dev_page_bread_crumbs"></div>\n <h1 id="dev_page_title" dir="auto">Privacy Policy</h1>\n \n <div id="dev_page_content" dir="auto"><blockquote>\n<p>You don\'t have to take our word on all of this. Telegram is an open source project. Anyone can study our <a href="https://core.telegram.org/api">API</a>, <a href="https://core.telegram.org/mtproto">Protocol</a> and <a href="/apps#source-code">Source Code</a> and make an informed decision.</p>\n</blockquote>\n<h3><a class="anchor" name="1-sharing-data" href="#1-sharing-data"><i class="anchor-icon"></i></a>1. Sharing data</h3>\n<p>We never share your data with anyone. No.</p>\n<h3><a class="anchor" name="2-storing-data" href="#2-storing-data"><i class="anchor-icon"></i></a>2. Storing data</h3>\n<p>Telegram only stores the data it needs to function properly \u2014 for as long as you want Telegram to function.</p>\n<h5><a class="anchor" name="cloud-chats" href="#cloud-chats"><i class="anchor-icon"></i></a>Cloud Chats</h5>\n<p>Telegram is a cloud service. We store messages, photos, videos and documents from your <em>cloud chats</em> on our servers, so that you can access your data from any of your devices anytime and use our instant server search to quickly access your messages from waaay back. All data is stored heavily encrypted and the encryption keys in each case are stored in several other DCs in different jurisdictions. This way local engineers or physical intruders cannot get access to user data.</p>\n<h5><a class="anchor" name="secret-chats" href="#secret-chats"><i class="anchor-icon"></i></a>Secret Chats</h5>\n<p><em>Secret chats</em> use end-to-end encryption. This means that all data is encrypted with a key that only you and the recipient know. There is <strong>no way</strong> for us or anybody else without direct access to your device to learn what content is being sent in those messages. We do not store your secret chats on our servers. We also do not keep any logs for messages in secret chats, so after a short period of time we no longer know who or when you messaged via secret chats. For the same reasons secret chats are not available in the cloud \u2014 you can only access those messages from the device they were sent <em>to</em> or <em>from</em>.</p>\n<h5><a class="anchor" name="media-in-secret-chats" href="#media-in-secret-chats"><i class="anchor-icon"></i></a>Media in Secret Chats</h5>\n<p>When you send photos, videos or files via secret chats, before being uploaded each item is encrypted with a separate key, not known to the server. This key and the file\u2019s location are then encrypted again, this time with the secret chat\u2019s key \u2014 and sent to your recipient. He can then download and decipher the file. This means that the file is technically on one of Telegram\u2019s servers, but it looks like a piece of random indecipherable garbage to everyone except for you and the recipient. We don\u2019t know what this random data stands for and we have no idea which particular chat it belongs to. We periodically purge this random data from our servers to save disk space.</p>\n<h5><a class="anchor" name="contacts" href="#contacts"><i class="anchor-icon"></i></a>Contacts</h5>\n<p>Telegram uses phone numbers as unique identifiers, so that it is easy for you to switch from other messaging apps (SMS, WhatsApp, etc.) and retain your social graph. We ask your permission before syncing your contacts.</p>\n<p>We store your contacts in order to notify you as soon as one of your contacts signs up for Telegram and to properly display names in notifications. We only need the number and name (first and last) for this to work and store no other data about your contacts.</p>\n<h5><a class="anchor" name="your-e-mail-address" href="#your-e-mail-address"><i class="anchor-icon"></i></a>Your e-mail address</h5>\n<p>When you enable 2-step-verification for your account, you can opt to set up a password recovery email. This address will only be used to send you a password recovery code, if you forget it. That\'s right: no marketing or \u201cwe miss you\u201d bullshit.</p>\n<h3><a class="anchor" name="3-deleting-data" href="#3-deleting-data"><i class="anchor-icon"></i></a>3. Deleting data</h3>\n<h5><a class="anchor" name="accounts" href="#accounts"><i class="anchor-icon"></i></a>Accounts</h5>\n<p>If you would like to delete your account, you can do this on the <a href="https://telegram.org/deactivate">deactivation page</a>. Deleting your account permanently removes all your <strong>messages</strong>, <strong>groups</strong> and <strong>contacts</strong>. This action must be confirmed via your Telegram account and cannot be undone.</p>\n<h5><a class="anchor" name="messages" href="#messages"><i class="anchor-icon"></i></a>Messages</h5>\n<p>Everything you delete is deleted forever. Except for cats.<br>We never delete your funny cat pictures, we love them too much.</p>\n<p>When you delete a message, you delete it from your message history. This means that a copy still stays on the server as part of your partner\u2018s message history. As soon as your partner deletes it too, it\u2019s gone forever. Telegram is a non-commercial project and we value the disk space on our servers greatly.</p>\n<h4><a class="anchor" name="self-destructing-messages" href="#self-destructing-messages"><i class="anchor-icon"></i></a>Self-destructing messages</h4>\n<p>Messages in Secret Chats can be ordered to <a href="/faq#q-how-do-self-destructing-messages-work">self-destruct</a>. As soon as such a message is <a href="/faq#q-what-do-the-green-checks-mean">read</a> (2 checks appear), the countdown starts. When the time is out, both devices participating in a secret chat are instructed to delete the message (photo, video, etc.).</p>\n<h4><a class="anchor" name="account-self-destruction" href="#account-self-destruction"><i class="anchor-icon"></i></a>Account self-destruction</h4>\n<p>Telegram is not a commercial organization and we value our disk space greatly. If you stop using Telegram and do not login for at least 6 months, your account will be deleted along with all messages, media, contacts and every other piece of data you store in the Telegram cloud. You can change the exact period after which your inactive account will self-destruct in Settings.</p>\n<p>This feature was introduced on November 19, 2014. Since the default self-destruct setting for Telegram accounts is 6 months, accounts that have last been active before November 19, 2014 self-destructed in May, 2015.</p>\n</div>\n \n</div>\n \n </div>'} 2017-02-26 16:56:20 [scrapy] DEBUG: Scraped from <200 https://telegram.org/privacy> {'content': u'<div class="tl_page">\n <div id="dev_page_content_wrap" class=" ">\n <div class="dev_page_bread_crumbs"></div>\n <h1 id="dev_page_title" dir="auto">Privacy Policy</h1>\n \n <div id="dev_page_content" dir="auto"><blockquote>\n<p>You don\'t have to take our word on all of this. Telegram is an open source project. Anyone can study our <a href="https://core.telegram.org/api">API</a>, <a href="https://core.telegram.org/mtproto">Protocol</a> and <a href="/apps#source-code">Source Code</a> and make an informed decision.</p>\n</blockquote>\n<h3><a class="anchor" name="1-sharing-data" href="#1-sharing-data"><i class="anchor-icon"></i></a>1. Sharing data</h3>\n<p>We never share your data with anyone. No.</p>\n<h3><a class="anchor" name="2-storing-data" href="#2-storing-data"><i class="anchor-icon"></i></a>2. Storing data</h3>\n<p>Telegram only stores the data it needs to function properly \u2014 for as long as you want Telegram to function.</p>\n<h5><a class="anchor" name="cloud-chats" href="#cloud-chats"><i class="anchor-icon"></i></a>Cloud Chats</h5>\n<p>Telegram is a cloud service. We store messages, photos, videos and documents from your <em>cloud chats</em> on our servers, so that you can access your data from any of your devices anytime and use our instant server search to quickly access your messages from waaay back. All data is stored heavily encrypted and the encryption keys in each case are stored in several other DCs in different jurisdictions. This way local engineers or physical intruders cannot get access to user data.</p>\n<h5><a class="anchor" name="secret-chats" href="#secret-chats"><i class="anchor-icon"></i></a>Secret Chats</h5>\n<p><em>Secret chats</em> use end-to-end encryption. This means that all data is encrypted with a key that only you and the recipient know. There is <strong>no way</strong> for us or anybody else without direct access to your device to learn what content is being sent in those messages. We do not store your secret chats on our servers. We also do not keep any logs for messages in secret chats, so after a short period of time we no longer know who or when you messaged via secret chats. For the same reasons secret chats are not available in the cloud \u2014 you can only access those messages from the device they were sent <em>to</em> or <em>from</em>.</p>\n<h5><a class="anchor" name="media-in-secret-chats" href="#media-in-secret-chats"><i class="anchor-icon"></i></a>Media in Secret Chats</h5>\n<p>When you send photos, videos or files via secret chats, before being uploaded each item is encrypted with a separate key, not known to the server. This key and the file\u2019s location are then encrypted again, this time with the secret chat\u2019s key \u2014 and sent to your recipient. He can then download and decipher the file. This means that the file is technically on one of Telegram\u2019s servers, but it looks like a piece of random indecipherable garbage to everyone except for you and the recipient. We don\u2019t know what this random data stands for and we have no idea which particular chat it belongs to. We periodically purge this random data from our servers to save disk space.</p>\n<h5><a class="anchor" name="contacts" href="#contacts"><i class="anchor-icon"></i></a>Contacts</h5>\n<p>Telegram uses phone numbers as unique identifiers, so that it is easy for you to switch from other messaging apps (SMS, WhatsApp, etc.) and retain your social graph. We ask your permission before syncing your contacts.</p>\n<p>We store your contacts in order to notify you as soon as one of your contacts signs up for Telegram and to properly display names in notifications. We only need the number and name (first and last) for this to work and store no other data about your contacts.</p>\n<h5><a class="anchor" name="your-e-mail-address" href="#your-e-mail-address"><i class="anchor-icon"></i></a>Your e-mail address</h5>\n<p>When you enable 2-step-verification for your account, you can opt to set up a password recovery email. This address will only be used to send you a password recovery code, if you forget it. That\'s right: no marketing or \u201cwe miss you\u201d bullshit.</p>\n<h3><a class="anchor" name="3-deleting-data" href="#3-deleting-data"><i class="anchor-icon"></i></a>3. Deleting data</h3>\n<h5><a class="anchor" name="accounts" href="#accounts"><i class="anchor-icon"></i></a>Accounts</h5>\n<p>If you would like to delete your account, you can do this on the <a href="https://telegram.org/deactivate">deactivation page</a>. Deleting your account permanently removes all your <strong>messages</strong>, <strong>groups</strong> and <strong>contacts</strong>. This action must be confirmed via your Telegram account and cannot be undone.</p>\n<h5><a class="anchor" name="messages" href="#messages"><i class="anchor-icon"></i></a>Messages</h5>\n<p>Everything you delete is deleted forever. Except for cats.<br>We never delete your funny cat pictures, we love them too much.</p>\n<p>When you delete a message, you delete it from your message history. This means that a copy still stays on the server as part of your partner\u2018s message history. As soon as your partner deletes it too, it\u2019s gone forever. Telegram is a non-commercial project and we value the disk space on our servers greatly.</p>\n<h4><a class="anchor" name="self-destructing-messages" href="#self-destructing-messages"><i class="anchor-icon"></i></a>Self-destructing messages</h4>\n<p>Messages in Secret Chats can be ordered to <a href="/faq#q-how-do-self-destructing-messages-work">self-destruct</a>. As soon as such a message is <a href="/faq#q-what-do-the-green-checks-mean">read</a> (2 checks appear), the countdown starts. When the time is out, both devices participating in a secret chat are instructed to delete the message (photo, video, etc.).</p>\n<h4><a class="anchor" name="account-self-destruction" href="#account-self-destruction"><i class="anchor-icon"></i></a>Account self-destruction</h4>\n<p>Telegram is not a commercial organization and we value our disk space greatly. If you stop using Telegram and do not login for at least 6 months, your account will be deleted along with all messages, media, contacts and every other piece of data you store in the Telegram cloud. You can change the exact period after which your inactive account will self-destruct in Settings.</p>\n<p>This feature was introduced on November 19, 2014. Since the default self-destruct setting for Telegram accounts is 6 months, accounts that have last been active before November 19, 2014 self-destructed in May, 2015.</p>\n</div>\n \n</div>\n \n </div>'} INFO:scrapy.core.engine:Closing spider (finished) 2017-02-26 16:56:20 [scrapy] INFO: Closing spider (finished) DEBUG:page_watcher_scraper.pipelines:closing policy file 2017-02-26 16:56:20 [page_watcher_scraper.pipelines] DEBUG: closing policy file INFO:scrapy.statscollectors:Dumping Scrapy stats: {'downloader/request_bytes': 218, 'downloader/request_count': 1, 'downloader/request_method_count/GET': 1, 'downloader/response_bytes': 11408, 'downloader/response_count': 1, 'downloader/response_status_count/200': 1, 'finish_reason': 'finished', 'finish_time': datetime.datetime(2017, 2, 26, 16, 56, 20, 603849), 'item_scraped_count': 1, 'log_count/CRITICAL': 6, 'log_count/DEBUG': 93, 'log_count/INFO': 49, 'response_received_count': 1, 'scheduler/dequeued': 1, 'scheduler/dequeued/memory': 1, 'scheduler/enqueued': 1, 'scheduler/enqueued/memory': 1, 'start_time': datetime.datetime(2017, 2, 26, 16, 56, 16, 409773)} 2017-02-26 16:56:20 [scrapy] INFO: Dumping Scrapy stats: {'downloader/request_bytes': 218, 'downloader/request_count': 1, 'downloader/request_method_count/GET': 1, 'downloader/response_bytes': 11408, 'downloader/response_count': 1, 'downloader/response_status_count/200': 1, 'finish_reason': 'finished', 'finish_time': datetime.datetime(2017, 2, 26, 16, 56, 20, 603849), 'item_scraped_count': 1, 'log_count/CRITICAL': 6, 'log_count/DEBUG': 93, 'log_count/INFO': 49, 'response_received_count': 1, 'scheduler/dequeued': 1, 'scheduler/dequeued/memory': 1, 'scheduler/enqueued': 1, 'scheduler/enqueued/memory': 1, 'start_time': datetime.datetime(2017, 2, 26, 16, 56, 16, 409773)} INFO:scrapy.core.engine:Spider closed (finished) 2017-02-26 16:56:20 [scrapy] INFO: Spider closed (finished) DEBUG:page_watcher:nothing changed, not committing/pushing 2017-02-26 16:56:20 [page_watcher] DEBUG: nothing changed, not committing/pushing

Statistics

Average successful run time: 7 minutes

Total run time: about 1 month

Total cpu time used: 21 minutes

Total disk space used: 242 KB

History

  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    14 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    14 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and failed .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and failed .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    15 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    16 pages scraped
  • Auto ran revision 7d5f437c and failed .
    nothing changed in the database
  • Auto ran revision 7d5f437c and failed .
    nothing changed in the database
  • Auto ran revision 7d5f437c and failed .
    nothing changed in the database
  • Auto ran revision 7d5f437c and failed .
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    12 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    29 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    1 page scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    1 page scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    12 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    14 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    12 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    14 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    2 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    42 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    19 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    14 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    17 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    9 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    11 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    10 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    9 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    11 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    11 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    11 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    11 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    12 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    11 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    9 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    11 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    11 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    12 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    11 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    10 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    11 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    11 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    11 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    11 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    13 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    11 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    12 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    11 pages scraped
  • Auto ran revision 7d5f437c and failed .
    nothing changed in the database
  • Auto ran revision 7d5f437c and failed .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
    11 pages scraped
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and failed .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 7d5f437c and completed successfully .
    nothing changed in the database
  • Auto ran revision 4f0bcca7 and completed successfully .
    nothing changed in the database
  • Auto ran revision 4f0bcca7 and completed successfully .
    nothing changed in the database
  • Auto ran revision 4f0bcca7 and completed successfully .
    nothing changed in the database
  • Auto ran revision 4f0bcca7 and completed successfully .
    nothing changed in the database
  • Auto ran revision 8a88ca17 and completed successfully .
    nothing changed in the database
  • Manually ran revision 8a88ca17 and completed successfully .
    nothing changed in the database
  • Manually ran revision d78b190f and failed .
    nothing changed in the database
  • Manually ran revision 9509d295 and completed successfully .
    nothing changed in the database
  • Manually ran revision 9509d295 and completed successfully .
    nothing changed in the database
  • Manually ran revision 76f4ae1e and failed .
    nothing changed in the database
  • Manually ran revision 76f4ae1e and completed successfully .
    nothing changed in the database
  • Manually ran revision b8129df6 and completed successfully .
    nothing changed in the database
  • Manually ran revision b7a421ff and completed successfully .
    nothing changed in the database
  • Manually ran revision e79f8ece and failed .
    nothing changed in the database
  • Manually ran revision e79f8ece and completed successfully .
    nothing changed in the database
  • Manually ran revision c7ad73f8 and completed successfully .
    nothing changed in the database
  • Manually ran revision 8bf944b3 and completed successfully .
    nothing changed in the database
  • Manually ran revision b2061840 and completed successfully .
    nothing changed in the database
  • Manually ran revision 2d0f50ec and failed .
    nothing changed in the database
  • Auto ran revision b74ae1af and failed .
    nothing changed in the database
  • Auto ran revision 43825bca and completed successfully .
    nothing changed in the database
  • Manually ran revision 5a4bffaa and failed .
    nothing changed in the database
  • Manually ran revision 7d326bd5 and failed .
    nothing changed in the database
  • Manually ran revision f832fda0 and failed .
    nothing changed in the database
  • Manually ran revision e32bea37 and failed .
    nothing changed in the database
  • Manually ran revision ffa0c764 and failed .
    nothing changed in the database
  • Manually ran revision ffa0c764 and failed .
    nothing changed in the database
  • Manually ran revision 0c8dcaa2 and failed .
    nothing changed in the database
  • Manually ran revision 671e8f04 and failed .
    nothing changed in the database
  • Manually ran revision 6af33aca and failed .
    nothing changed in the database
  • Manually ran revision 1ba2e0f5 and failed .
    nothing changed in the database
  • Manually ran revision 85a14bb9 and failed .
    nothing changed in the database
  • Manually ran revision 6898df17 and failed .
    nothing changed in the database
  • Manually ran revision ff197dcf and failed .
    nothing changed in the database
  • Manually ran revision ff197dcf and failed .
  • Created on morph.io

Scraper code

Python

page_watcher_scraper / scraper.py