Gutter
Biometric data includes: facial geometry, fingerprints, voice patterns, retinal scans, DNA sequences (if you've used any ancestry service, we have it), and your unique typing rhythm.
Personal identifiers include: name, email, phone number, address, Social Security number (where permitted), driver's license, passport details, and that nickname your friends use that you'd rather we didn't know.
Behavioral data includes: browsing history, search queries, purchase patterns, location history, app usage, sleep patterns, exercise habits, and how long you stare at certain images (we notice everything).
We collect information you provide directly, information you don't know you're providing, information your devices leak like a sieve, and information we purchase from data brokers who got it from someone else.
Location data is collected continuously, even when you think it's off. Your phone knows where you are, and now we do too. That "approximate location" is accurate to within 3 meters.
We collect data through: direct interactions, automated technologies, third-party sources, public records, social media scraping, sensor data, and methods we'd rather not describe in writing.
Cookies, pixels, beacons, and trackers follow you across the internet like a persistent ex. Our partners' trackers do too. It's a whole tracking party, and you're the guest of honor.
We comply with COPPA by having a policy that mentions COPPA. Beyond that, our compliance is best described as "theoretical."
Teen users (13-17) receive all the privacy protections of adults, meaning minimal protections, but with more colorful UI elements.
Age verification consists of asking users to confirm they're old enough, which has never failed because no child has ever lied about their age online.
To provide and maintain our Service (the part you expected), and to maximize revenue extraction from your digital existence (the part that pays our bills).
To personalize your experience, meaning we manipulate what you see to encourage behaviors that benefit us, disguised as "relevance" and "convenience."
For marketing purposes, including: targeted ads, personalized offers, psychological nudging, dark patterns, and A/B tests where you're always in the group that makes us more money.
To comply with legal obligations, respond to law enforcement requests (with varying levels of resistance depending on jurisdiction and news coverage), and protect our legal interests.
We may update this Privacy Policy occasionally, which means whenever we find new ways to monetize your data that require legal cover.
Changes are effective immediately upon posting. We'll notify you via email (if we feel like it), in-app message (if you're lucky), or telepathy (if it worked).
Your continued use after changes constitutes acceptance. Your discontinued use also constitutes acceptance of pre-change terms. Schrödinger's consent.
In the event of a breach, we'll notify affected users within the legally required timeframe, which gives us plenty of time to prepare our "We Take Security Seriously" press release.
We implement "reasonable" security measures, where "reasonable" is defined as whatever we can afford after executive bonuses.
Encryption is used during transmission and "at rest," though the encryption keys are stored in a text file labeled "do_not_share.txt" on a shared drive.
Retention periods vary by data type: transaction records (7 years), behavioral data (until it's worthless), biometric data (until you look different), everything else (forever).
Legal holds, regulatory requirements, and "legitimate business interests" justify retention well beyond any reasonable timeframe. We're very interested in your data, legitimately.
We retain your data for as long as necessary, which means forever, because data might become valuable and storage is cheap.
Remember: in the digital age, if you're not paying for the product, you are the product. And even if you are paying, you're still the product. Everyone's a product.