Privacy policy for Zelda Anti-Phishing
Zelda Anti-Phishing by Akuka, Firefox user 13693734
This privacy policy (the "Privacy Policy") is an integral part of the terms of use and both
documents should be read together.
The browser extension “Zelda Anti-Phising” (the “Extension”), operated and managed by
Segasec Labs Ltd. (the “Operator”) is, among other things, an extension which prevents
phishing sites from being accessed using your browser (“You” or the “Users” and the
“Service”).
The Operator respects the privacy of its users. In order to improve the protection of the
Users, the Operator publishes this Privacy Policy regarding how the Operator collects Your
information from Your use of the Extension.
1. General
During Your use of the Extension, information regarding Your use of the Extension
may be collected including, but not only, websites You visited and websites detected
as fraudulent. Such information is statistic and does not identify You.
2. Database and Use of Information
2.1. All collected information as stated above is stored in the Operator’s database. The
Operator warrants to use such information according to the Privacy Policy and/or
according to any applicable law and for the following purposes:
Enabling convenient and efficient use;
Improve and enrich existing services and content;
Modify and/or remove existing services and content;
Perform research and provide statistic information to third parties (in such case,
the provided information will not identify You);
Enforce the Operator’s Terms;
Providing You unique services;
Any other purpose detailed in the Terms and this Privacy Policy.
[Elad: please confirm this and accordingly add/remove purposes]
3. Transferring Information to Third Parties
The Operator may transfer and/or share Your information in the following events and
circumstances:
When You have permitted the Operator to transfer and/or share Your information;
When You violate the Terms of the Extension or act illegally;
To enforce the Terms or the Privacy Policy;
In response to a subpoena or similar investigative demand, a court order, or a
request for cooperation from law enforcement or other government agency;
To establish or exercise the Operator’s legal rights;
To defend against legal claims; or as otherwise required by law. In such cases, the
Operator may raise or waive any legal objection or right available to the Operator, in
the Operator's sole discretion;
When the Operator believes disclosure is appropriate in connection with efforts to
investigate, prevent, report or take other action regarding illegal activity, suspected
fraud or other wrongdoing;
To protect and defend the rights, property or safety of the Operator, its Users,
employees or others;
In connection with a substantial corporate transaction, such as the sale of the
Operator’s business, a divestiture, merger, consolidation, or asset sale, or in the
event of liquidation.
[Elad: please confirm this and accordingly add/remove purposes]
4. Cumulative and Non-Personal Information
The Operator may use cumulative and non-personal information which the Operator
collected as detailed above. The Operator may combine non-personal information
which the Operator collected with non-personal information collected from other
sources. Furthermore the Operator may share cumulative information with third
parties including advisors, investors and advertisers for business analysis. For
example, the Operator may report the number of visitors of phishing websites. Such
information is not personal and may be used in order to develop content and services
which will assist the User and will adjust content and advertisement.
5. Third-Parties
5.1. There are a number of places on the Extension where You may click on a link to
access other websites that do not operate under this Privacy Policy and are not
related to the Operator including, but not only, links to “GitHub”. These links may
independently solicit and collect information, including personal information, from
You and, in some instances, provide the Operator with information about Your
activities on those links.
5.2. Every third party such as detailed above may have its own privacy policy describing
its use of personal information, and such policy will regulate the use, handling and
disclosure of such personal information of the User. Should You require additional
information regarding any privacy policy of third parties, The Operator recommends
that You visit these third-party websites and read their privacy policies.
6. Use of Cookies [Elad: please check if relevant]
6.1. The Operator uses various technologies to collect information from Your device and
about Your activities while using the Extension.
6.2. The Operator automatically collects information from Your browser when You use
the Extension. This information includes, but not only, Your IP address, Your
browser type and language, access times, the content of any undeleted cookies that
Your browser previously accepted from the Operator and the referring website
address.
6.3. Cookies: When You use the Extension, the Operator may assign Your computer or
mobile device one or more cookies, to facilitate access to the Extension and to
personalize Your online experience. Through the use of a cookie, the Operator also
may automatically collect information about Your online activity using the Extension,
such as the web pages You visit, the links You click, and reported phishing websites
alerted by the Extension. Most browsers automatically accept cookies, but You can
usually modify Your browser setting it to decline cookies. If You choose to decline
cookies, please note that You may not be able to use some of the features offered
on the Extension.
6.4. The Operator may use standard internet technology, such as web beacons and
other similar technologies, to track Your use of the Extension. The information the
Operator obtains in this manner enables the Operator to customize the services the
Operator offers users of the Extension and to measure the overall effectiveness of
the Operator’s content, programming or other activities.
7. Data Security
7.1. The Operator takes appropriate security measures for data security purposes to help
prevent unauthorized persons from gaining access to Your personal information.
However, no system can be completely secure. Therefore the Operator does not
warrant that its services will be totally immune to any breaches of security and/or
unauthorized access, including access to the data stored in the Extension.
7.2. The Operator inspects, from time to time, the data security of the Extension and
performs modifications and upgrades accordingly in order to keep the Extension’s
security. Nonetheless, the Operator will not be liable for any direct or indirect
damage caused to You due to exposure of Your information by an unauthorized
access to the Operator’s database and/or due to any negligence or act not
controlled by the Operator.
8. Your Right to Browse Your Information
8.1. According to the Israeli Privacy Law-1981, every individual has the right to browse
the information gathered on him and stored in the databases. An individual who
found that his or her stored information is incomplete, inaccurate, unclear and/or
updated may address the owner of such database and request the amendment
and/or update and/or removal of his or her information.
You may address the Operator regarding such issue via email address:
support@segasec.com. Please note that these contact details and days and hours
may change at the Operator’s sole discretion and without any prior notice or consent
and You will not have any claims against the Operator in such case.
8.2. If such information of an individual is used for personal contact, he or she may
request in writing and according to the law that such information will be deleted from
the database.
9. Changes to This Privacy Policy
The Operator may occasionally update this Privacy Policy. The Operator will notify
You by sending an email to the email address You most recently provided the
Operator and/or by prominently posting notice of the changes and will state at the
heading of the Privacy Policy the date of change.