- Visit our website
at urbaninitiatives.org , or any website of ours that links to this privacy notice
- Engage with us in other related ways, including any sales, marketing, or events
names
phone numbers
email addresses
mailing addresses
- Log and Usage Data. Log and usage data is service-related, diagnostic, usage, and performance information our servers automatically collect when you access or use our Services and which we record in log files. Depending on how you interact with us, this log data may include your IP address, device information, browser type, and settings and information about your activity in the Services (such as the date/time stamps associated with your usage, pages and files viewed, searches, and other actions you take such as which features you use), device event information (such as system activity, error reports (sometimes called
“crash dumps” ), and hardware settings).
- Device Data. We collect device data such as information about your computer, phone, tablet, or other device you use to access the Services. Depending on the device used, this device data may include information such as your IP address (or proxy server), device and application identification numbers, location, browser type, hardware model, Internet service provider and/or mobile carrier, operating system, and system configuration information.
- Location Data. We collect location data such as information about your device’s location, which can be either precise or imprecise. How much information we collect depends on the type and settings of the device you use to access the Services. For example, we may use GPS and other technologies to collect geolocation data that tells us your current location (based on your IP address). You can opt out of allowing us to collect this information either by refusing access to the information or by disabling your Location setting on your device. However, if you choose to opt out, you may not be able to use certain aspects of the Services.
- To evaluate and improve our Services, products, marketing, and your experience. We may process your information when we believe it is necessary to identify usage trends, determine the effectiveness of our promotional campaigns, and to evaluate and improve our Services, products, marketing, and your experience.
- Business Transfers. We may share or transfer your information in connection with, or during negotiations of, any merger, sale of company assets, financing, or acquisition of all or a portion of our business to another company.
| Category | Examples | Collected |
A. Identifiers | Contact details, such as real name, alias, postal address, telephone or mobile contact number, unique personal identifier, online identifier, Internet Protocol address, email address, and account name | |
B. Personal information categories listed in the California Customer Records statute | Name, contact information, education, employment, employment history, and financial information | |
C. Protected classification characteristics under California or federal law | Gender and date of birth | |
D. Commercial information | Transaction information, purchase history, financial details, and payment information | |
E. Biometric information | Fingerprints and voiceprints | |
F. Internet or other similar network activity | Browsing history, search history, online | |
G. Geolocation data | Device location | |
H. Audio, electronic, visual, thermal, olfactory, or similar information | Images and audio, video or call recordings created in connection with our business activities | |
I. Professional or employment-related information | Business contact details in order to provide you our Services at a business level or job title, work history, and professional qualifications if you apply for a job with us | |
J. Education Information | Student records and directory information | |
K. Inferences drawn from other personal information | Inferences drawn from any of the collected personal information listed above to create a profile or summary about, for example, an individual’s preferences and characteristics | |
| L. Sensitive Personal Information |
- Category A –
1 year
- Category B –
1 year
- Receiving help through our customer support channels;
- Participation in customer surveys or contests; and
- Facilitation in the delivery of our Services and to respond to your inquiries.
- whether we collect and use your personal information;
- the categories of personal information that we collect;
- the purposes for which the collected personal information is used;
- whether we sell or share personal information to third parties;
- the categories of personal information that we sold, shared, or disclosed for a business purpose;
- the categories of third parties to whom the personal information was sold, shared, or disclosed for a business purpose;
- the business or commercial purpose for collecting, selling, or sharing personal information; and
- the specific pieces of personal information we collected about you.
- You may object to the processing of your personal information.
- You may request correction of your personal data if it is incorrect or no longer relevant, or ask to restrict the processing of the information.
- You can designate an
authorized agent to make a request under the CCPA on your behalf. We may deny a request from an authorized agent that does not submit proof that they have been validly authorized to act on your behalf in accordance with the CCPA.
- You may request to opt out from future selling or sharing of your personal information to third parties. Upon receiving an opt-out request, we will act upon the request as soon as feasibly possible, but no later than fifteen (15) days from the date of the request submission.
- Right to be informed whether or not we are processing your personal data
- Right to access your personal data
- Right to correct inaccuracies in your personal data
- Right to request deletion of your personal data
- Right to obtain a copy of the personal data you previously shared with us
- Right to opt out of the processing of your personal data if it is used for targeted advertising, the sale of personal data, or profiling in furtherance of decisions that produce legal or similarly significant effects (
“profiling” )
14. SMS OPT-IN – DATA
No mobile information including SMS Opt-in data will be shared with third parties/affiliates for their direct marketing/promotional purposes. All the above categories exclude text messaging originator opt-in data and consent; this information will not be shared with any third parties.
Message frequency varies per user.
Message and data rates may apply.
Text HELP for help. Text STOP to unsubscribe.
Carriers are not liable for delayed or undelivered messages.
15. HOW DO WE PROTECT PERSONAL INFORMATION FROM UNAUTHORIZED ACCESS?
Urban Initiatives takes measures to protect personal information from unauthorized access. All of our internal systems are password protected with Multi Factor Authentication. Personal information stored in our internal drive is kept in restricted files and scheduled to be deleted after 5 years. Personal information is also stored in platforms like Rippling, Salesforce, and FormAssembly is encrypted.
FormAssembly uses a Salesforce Connector to transfer data. This connector has its own authentication via Salesforce OAuth tokens that has to be completed to connect to Salesforce. We have updated our FormAssembly to use the latest version of Salesforce API (version 61.0) for safety. Data is sent using HTTPS and is secured via Transport Layer Security protocol (TLS). For frequency of data exchange, FormAssembly makes the following API Calls per each submitted form response: 1 API call to authenticate, 1 API call for a lookup or create operation (per object), 2 API calls for an update operation (per object). So for example, a connector that updates a contact record and creates an attachment record would make 4 API calls. Data is sent to the Salesforce connector immediately after a form is submitted.
FormAssembly follows the NIST Cybersecurity Framework, which is a voluntary Framework consisting of standards, guidelines, and best practices to manage cybersecurity-related risks. FormAssembly is PCI DSS Level 1 Certified and is compliant with GDPR, HIPAA, FERPA, EU-U.S. Privacy Shield, the Australian Federal Privacy Act and Australian Privacy Principles. FormAssembly employs a Web Application Firewall to protect data against common web attacks. It follows the OWASP top 10 and SANS top 25 to ensure confidentiality, integrity, and availability of data.
In addition, Urban Initiatives has multi-factor authentication set up for all Salesforce users in compliance with Salesforce user security policies. Urban Initiatives’ Google Drive is password protected with multi-factor authentication and identifiable youth survey data are only accessible to Urban Initiatives evaluation staff members. Data are deidentified and aggregated for reporting purposes, to protect the privacy of participants.
