Privacy Policy

Your privacy is important to us. This privacy statement explains the personal data Nequeo processes, how Nequeo processes it, and for what purposes.

Personal data we collect

You have choices when it comes to the technology you use and the data you share. When we ask you to provide personal data, you can decline. Many of our products require some personal data to provide you with a service. If you choose not to provide data required to provide you with a product or feature, you cannot use that product or feature. Likewise, where we need to collect personal data by law or to enter into or carry out a contract with you, and you do not provide the data, we will not be able to enter into the contract; or if this relates to an existing product you’re using, we may have to suspend or cancel it. We will notify you if this is the case at the time. Where providing the data is optional, and you choose not to share personal data, features like personalization that use such data will not work for you.

Cookies and similar technologies

Cookies are small text files placed on your device to store data that can be recalled by a web server in the domain that placed the cookie. We use cookies and similar technologies for storing and honoring your preferences and settings, enabling you to sign in, providing interest-based advertising, combating fraud, analyzing how our products perform, and fulfilling other legitimate purposes.

How we store personal information

We take reasonable steps to protect your personal information against misuse, interference and loss, and from unauthorised access, modification or disclosure. These steps include:

When no longer required, we destroy or archive personal information in a secure manner.

Terms of Use⁠

These Terms of Use apply to your use of all Nequeo's services for individuals, along with any associated software applications and websites (all together, "Services").

Security Policy⁠

We take the protection of our data very seriously. We are committed to working with security researchers to verify and address any potential vulnerabilities that are reported to us.