Welcome to Fabletics Influencers!
We care deeply about your privacy. We’re committed to being transparent about our privacy practices, including how we treat your personal information.
We need to use your personal information to provide you with the best user experience when visiting this Blog. Please read this privacy notice carefully. By visiting the Blog and accepting the cookie and privacy notice, we assume that you consent to the privacy practices and indispensable tools that we use to provide you the best user experience. If you don’t want us to collect or use your information in the ways described in this notice, you shouldn’t visit this Blog.
1. THE INFORMATION WE COLLECT
When you visit our Blog, we collect or receive your personal information in the following ways:
• Automated information: We automatically receive and record information from your browser or your mobile device when you visit our Blog, such as your IP address or unique device identifier, cookies and data about which pages you visit, so we may provide you a better user experience. This information is stored in log files and is collected automatically.
• Location information: We may collect information about your location from your IP address. We may use and store this information to provide features and to improve and personalise the Blog. For example, for internal analytics and performance monitoring, to localise content and (using non-precise location information) for marketing purposes.
• Analytics information: We use data analytics to ensure the functionality of, and to improve, the Blog. We do not link the information we store within the analytics software to any personal information that you submit, such a comments.
2. HOW WE USE YOUR INFORMATION
2.1. LEGAL BASES FOR PROCESSING
When you visit our Blog, we collect, use, share and otherwise process your personal information as described in this notice. Whenever we process your personal information we do so on one of the following legal bases:
• you have given your consent for us to do so;
• it’s necessary for our legitimate interests or the legitimate interests of a third party;
2.2. INFORMATION USES
• Providing and improving the Blog: We use your information to provide and improve the Blog, for general research and aggregate reporting.
• Service providers: We work with third party service providers (“partners”), such as analytics and security providers, to help us operate, provide the Blog. These service providers have only limited access to your personal information, may use your information only to perform their specific tasks on our behalf, and are obligated not to disclose or use your information for any other purpose.
• Other third parties: Third party plug-ins or add-ons may collect information about your use of the Blog. For example, when you load a page on the Site that has a social plug-in from a third party site or service, such as a ‘Like’ or ‘Send’ button, you are also loading content from that third party site. These interactions are subject to the privacy practices of the third party. In addition, certain cookies and other similar technologies on the Site are used by third parties for targeted online marketing and other purposes.
• Aggregated information: We may share demographic information with third parties for various purposes, including to comply with our reporting obligations, for business or marketing reasons, or to assist third parties in understanding the Blog and our business. Such demographic information will be aggregated and de-personalised, so that your personal information is not revealed.
• Corporate actions: We may enter into transactions such as a sale, merger, liquidation, receivership or transfer of all or a significant portion of our business or assets. Such transactions may be necessary and in our legitimate interests, particularly our interest in making decisions that enable our business to develop over the long term. In such transactions, user information may be transferred. If we intend to transfer information about you we will notify you as described in section 7 and, to the extent required by applicable law, you will be given an opportunity to opt out before information about you becomes subject to different privacy practices.
3. TRANSFERRING YOUR INFORMATION
We are part of a global group of companies. By visiting our Blog, you acknowledge that we may use the personal information we collect or receive about you in the European Economic Area (“EEA”), US and other countries in which we and our partners operate for purposes described in this notice. This includes sharing your information with TechStyle Inc., our US parent company, and other companies in our global group.
We will transfer your information only to those countries to which we are permitted by law to do so, and we will take steps to ensure that your information continues to enjoy appropriate protections.
4. ABOUT COOKIES AND SIMILAR TECHNOLOGIES
Cookies and other similar technologies (collectively, “Cookie Technologies”) are used by us and our partners. Cookie Technologies serve a number of purposes, including allowing the Blog to function and helping us to understand how you use the Blog.
4.1. TYPES OF COOKIE TECHNOLOGIES
• Cookies: These are small data files sent from a server to your browser. They are stored in your browser’s cache and allow a website or a third party to recognise your browser.
Cookies allow the Blog to function and enable us to personalise your experience. You may configure your browser’s settings to reflect your preference to accept or reject cookies, including how to handle third party cookies. For more information, see section 4.3.
• Local storage objects: These are sets of data, sometimes called flash cookies, that may be stored on your browser. They may be used to maintain your preferences, history of usage, or the state or settings of an app.
• Web beacons: These are tiny graphics, sometimes called “clear GIFs” or “web pixels”, with a unique identifier that are used to understand your browsing activity. Web beacons are rendered invisibly on web pages when you open a page.
• Social widgets: These are buttons or icons provided by third party social media providers that allow you to interact with social media Blog when you view a web page or a mobile app screen. These widgets may collect browsing data, which may be received by the third party that provided the widget, and are controlled by the third parties.
• UTM codes: These are code strings that may appear in a URL when a user moves from one web page or website to another. The string may represent information about your browsing, such as which ad, page, or publisher sent you to the receiving website.
4.2. PURPOSES OF COOKIE TECHNOLOGIES
We use Cookie Technologies to recognise you on the Site, to make the Site function for you, and to help personalise your experience and use of the Blog. More specifically, we use Cookie Technologies for:
• Social networks: Some Cookie Technologies help you to interact with social networks while using the Blog, such as sharing content with the network. Social networks may also work with us for analytics or marketing purposes, as detailed below. You may be able to manage your privacy preferences for these social networks and their tools and widgets via your account with the network.
• Performance and analytics: Some Cookie Technologies provide performance data on how the Blog are functioning in order to help improve them. We use these Cookie Technologies to collect information about your use of the Site, such as pages visited or any errors you may encounter. These Cookie Technologies either do not collect personal information, or aggregate the information in such a way that it is anonymised. The Site also employ Google Analytics to help understand how the Blog are used. For some of the marketing Blog listed below, like retargeting, data from Google Analytics may be combined with data we hold and with third party cookies. For information on how to opt out of Google Analytics Advertising Features, see section 4.3 For more information on Google Analytics, see here.
4.3. MANAGING COOKIE TECHNOLOGIES
You have the ability to control the use of certain Cookie Technologies:
• Marketing preferences: You may manage your marketing preferences.
• Browser settings: You may change your browser’s settings to reflect your preferences relating to Cookie Technologies. Each browser differs, but these settings are typically under an ‘options’ or ‘preferences’ menu. Please be aware that if you reject or block all Cookie Technologies in your browser settings, you might have some limitations while using the blog.
• Third party networks: If you do not wish Cookie Technologies to be used to serve you interest-based ads, you may opt out of receiving interest-based ads through Your Online Choices. Please note that you will continue to receive generic ads.
• Google Analytics: You may opt out of Google Analytics Advertising Features through Google Ads Settings. Google also provides a Google Analytics Opt-out Browser Add-on.
• Third party tools: Various third parties provide plug-ins and apps that may help provide you information on, and limit or block, Cookie Technologies.
5. RIGHT OF REVOCATION
You have the right to revoke your consent to use certain cookies and the processing of your personal data at any time. This also applies to profiling according to Art. 4 (4) GDPR.
In case you revoke the processing of your personal data for direct advertising purposes your personal data is not processed for this purpose. The processing of your personal data remains justified until the date of your revocation. The revocation can be made through the following e-mail address:
6. INFORMATION SECURITY
The security of your personal information is very important to us. We follow generally accepted standards to protect the information we collect and receive, both during transmission and after it is received. We maintain appropriate administrative, technical and physical safeguards to protect your information against accidental or unlawful destruction, accidental loss, unauthorized alteration, unauthorized disclosure or access, misuse, and any other unlawful form of processing. This includes, for example, firewalls, encryption and other access and authentication controls.