This page provides information about the privacy and security of Reejig’s software and services which can help our customers to assess our security and privacy program, including by completing data privacy impact assessments. It does not provide legal advice. We urge you to consult with your own legal counsel to familiarize yourself with the requirements that govern your specific situation.
Reejig is committed to both complying with applicable data protection laws when providing services to our customers as a processor and to ensuring that our customers can continue to use our software and services while complying with the applicable data protection laws. Data protection law compliance requires a partnership between Reejig and our customers in their use of our software and services. As part of our commitment to our customers, we’ve published this document to describe the features customers can use when responding to common requests using Reejig’s software and services, and to assist our customers in completing their data protection impact assessment for Reejig’s software and services. This document may also help you assess how Reejig complies with its obligations under applicable data protection laws and customer agreements.
Security & Architecture.
Data protection laws require organizations to use appropriate technical and organizational security measures to protect Personal Data against unauthorized processing and accidental disclosure, access, loss, destruction, or alteration. Reejig has robust security and privacy practices in place that comply with industry standards. They enable Reejig and its Customers to comply with a variety of data protection laws and regulations applicable to Reejig’s software and services.
Every customer’s data is stored separately and encrypted at rest, and in transit. Reejig customers can also utilize user role-based access privileges. Reejig has also implemented procedures designed to ensure that Customer Data is processed only as instructed by a customer, throughout the entire chain of processing activities by Reejig and its sub-processors.
Security Controls & Certifications.
The Reejig Services include a variety of security controls, policies, and procedures, as further described here, https://www.reejig.com/security, and in any other documentation provided to a customer. Reejig has obtained multiple industry-standard third-party certifications and audit reports, including ISO 27001 and SOC2 Type II.
Data Subject Rights.
Data protection laws afford individuals whose Personal Data is processed certain rights, depending on where they are a resident. These rights require companies to have systems in place to respond to and effectively address individual data subjects’ requests. For example, if an individual submits a request to have its Personal Data deleted and the relevant circumstances apply, companies must be equipped to find the relevant Personal Data linked to that individual and delete it.
Upon a customer’s request, Reejig will delete the personal data of an individual in Reejig’s software. If Reejig receives a data subject access request directly from a customer related data subject, Reejig will forward the request to a customer and await further instructions from a customer.
Provide a general description of the Reejig Services.
For a description of each Reejig Service, please see the offerings listed on Reejig's Website.
Describe the Personal Data that will be used, stored, collected, disclosed, or otherwise Processed in Reejig’s software.
Reejig customers can choose what data to submit to, and collect, using Reejig’s software. The Personal Data processed will vary per a customer’s own use-case. Typical Personal Data processed within the Reejig Services may include names, contact information, professional information, and other information about candidates and employees.
Does the personal data include “special categories of personal data” (as defined under GDPR) or personal data related to criminal convictions or offences?
Reejig customers may be able to submit “special categories of Personal Data” to Reejig’s software. Reejig customers are responsible for ensuring that submission of any special categories of Personal Data, where permitted, complies with applicable laws. Customers do not need to input special categories of personal data or other high risk personal data in Reejig for Reejig to provide Reejig’s software and services.
Does the personal data include financial account numbers, government identification numbers, or health information?
This information is not necessary for Reejig to provide Reejig’s software and services. If a customer places this information in Reejig’s software, then Reejig may process this information.
Are individual data subjects made aware of the details of the processing of their personal data?
Reejig’s software does not operate at the point of collection for candidate data. Thus, Reejig does not directly communicate with a customer’s data subjects. Responsibility for making data subjects aware of a customers’ processing of their personal data using the Reejig’s software and services rests with customers. This responsibility is usually fulfilled via a customer’s applicant tracking or candidate relationship management tool.
To the extent Reejig processes personal data for its own purposes, the Reejig Privacy Statement and other privacy-related documentation are publicly available at the Reejig Legal Center.
How is access to the software managed?
Reejig customers can assign different levels of access to their users. Reejig’s software and services also allows customers to assign access permissions based on the user’s role. Reejig’s Customer contracts restrict access by Reejig’s personnel as further outlined below in the section “Can Reejig personnel access Personal Data in the Service”.
To the extent Customers need Reejig’s assistance in managing Personal Data, Reejig has committed to helping as described in its Data Processing Addendum located here: Reejig DPA.
Can Reejig personnel access personal data in the software? If so, where are those personnel located and for what purpose do they need access?
Reejig’s Data Processing Addendum contains a contractual commitment by Reejig that its personnel may access Personal Data only in accordance with Customer’s documented instructions for specific purposes, including processing under the Data Processing Addendum, processing initiated by the customer in using Reejig’s software and services, and processing to comply with other instructions provided by a customer. The locations of Reejig’s Affiliates that employ personnel who may access Personal Data for these purposes are available in the data processing addendum here: Reejig DPA.
Who will manage security?
Reejig has policies and procedures in place to protect the security of the Reejig’s software. Reejig’s security is described here Reejig Security, as well as in any additional documentation provided to a customer upon request. Customers are responsible for maintaining the confidentiality of all their authorized users’ names and passwords.
Who is responsible for assuring proper use of the personal data?
Customers are responsible for using the Reejig Services appropriately, including their processing of personal data using Reejig’s services. Reejig’s Data Processing Addendum provides that Reejig is responsible for providing the Reejig Services appropriately and contains a commitment from Reejig to use the Personal Data only in accordance with Customer’s documented instructions for specific purposes, including processing under the Data Processing Addendum, processing initiated by the Customer in using the Reejig Services, and processing to comply with other instructions provided by a customer.
How can requests from individual data subjects to access or correct their personal data be handled?
The Reejig Services allow Customers to manage the Personal Data they maintain in the Reejig Service, including in response to Data Subject requests.
To the extent a customer needs Reejig’s assistance to respond to a Data Subject, Reejig will provide assistance as described in its Data Processing Addendum.
Where will personal data be stored?
Reejig’s storage locations for Personal Data are described in Reejig's DPA.
Reejig utilizes the Standard Contractual Clauses to support the international transfer of data.
Describe the information flows for personal data for Reejig’s software.
Reejig’s software is a cloud-based platform, and Customers can allow their users to access the Reejig Services from virtually anywhere with an internet connection. For these reasons, Personal Data may flow to or from Reejig from global locations, depending on where the Customer, its users, and other end users and its website visitors are located.
The locations of Reejig and its Sub-processors are described here: Reejig Subprocessors.
How are transfers across national borders accounted for? If a transfer takes place, what is the purpose of this transfer?
Reejig’s Data Processing Addendum offers the Standard Contractual Clauses (the “SCCs”) as a transfer mechanism for all Reejig Services and includes an “order of precedence” clause if mechanism is not or no longer applicable.
For more information about these transfer mechanisms and which Reejig Services will rely on which mechanism, please see Reejig's DPA.
The purpose of such a transfer could for example be to allow a Reejig employee based in the United States to provide customer support to a European customer.
How (and with whom) will personal data be shared?
Personal Data is shared with Reejig and, if applicable, its Sub-processors, as described here: Reejig's Subprocessors.
Access by Reejig and its Sub-processors is subject to the protections in the Data Processing Addendum and Reejig maintains safeguards to prevent access except (x) to provide the Reejig Service and prevent or address service or technical problems, (y) as compelled by law, and (z) as the Customer expressly permits in writing.
Which controls does Reejig have in place with respect to sub-processors?
As described in the Data Processing Addendum, Reejig (i) takes responsibility for the actions of its Sub-processors, and (ii) has entered into a written agreements with each Sub-processor containing data protection obligations not less protective than those in our customer agreements. In addition, all the data transfer mechanisms that Reejig offers contain comprehensive obligations in respect of Sub-processors.
Up-to-date information about Reejig’s Sub-processors can be found at https://www.reejig.com/subprocessors. Customers may subscribe to notifications of new Sub-processors for each service at the foregoing link. Reejig will notify all subscribed customers of a new sub-processor before authorizing the new sub-processor to process customer data. Customers may object to the intended use of a new sub-processor using the procedure set forth in their agreement with Reejig.
What contracts are in place to protect personal data submitted to the Service?
Protections for Personal Data are described in a Reejig Customer’s contract with Reejig, specifically in Reejig's DPA.
Contractual documents containing protections for personal data include (1) a master subscription agreement between Reejig and a Customer or other document governing the purchase of a subscription to Reejig’s software and services, and/or (2) a Data Processing Addendum.
How does Reejig respond to government requests to access Customer Data?
As explained in Reejig’s MSA, Reejig will disclose Customer Data to a governmental entity only when required to do so by law, in response to a valid compelled disclosure request from a governmental entity.
Reejig has not received a government request for customer data. In the unusual circumstances where we do receive such a request, Reejig process whereby the Reejig Legal Department reviews the request to determine if it is lawful, valid, and enforceable, and we notify our customer of the request, to the extent permitted by law. Reejig can contractually guarantee to provide such notification customer agreements.
For more details, please see Reejig's Data Privacy & Government Surveillance Frequently Asked Questions Documentation.
How are breach notifications addressed?
Reejig has comprehensive procedures in place to notify Customers in the event of a data breach of its systems as managed by its Computer Security Incident Response Team (CSIRT). Reejig commits contractually in its Data Processing Addendum to notifying Customers “without undue delay” which is the standard of notification required for processors in accordance with applicable law. Reejig has a formal Incident Management Process that guides the Reejig Computer Security Incident Response Team (CSIRT) in investigation, management, communication, and resolution activities.
Reejig will promptly notify the Customer in the event of any security breach of Reejig Services resulting in an actual or reasonably suspected unauthorized disclosure of Customer Data. Notification may include phone contact by Reejig Support, email to the Customer’s administrator and Security Contact (if submitted by Customer), and public postings on trust. Reejig.com. Regular updates are provided to engaged parties until issue resolution. Incident tracking and resolution is documented and managed within an internal ticketing system.
Can Personal Data be encrypted?
Yes. Reejig encrypts data both rest and in transit. Please see the Reejig Security page for more detail.
How long is personal data retained?
Customers choose how long to retain customer data, including personal data, on Reejig’s software. Unless otherwise specified in the customer’s agreement, Reejig does not delete customer data, including Personal Data, during a subscription term, unless the Customer instructs Reejig to do so. After a customer’s contract with Reejig terminates, Reejig deletes customer data, including personal data, in the manner described in a customer’s agreement.
How is personal data deleted when it is no longer needed?
Unless otherwise agreed in the agreement with a customer, Reejig deletes customer data within 30 days of the customer agreement’s termination.
How are requests from individuals (or data subjects) to have their personal data deleted managed?
As described in Reejig’s Data Processing Addendum, Reejig shall notify a customer if it receives a request to exercise rights related to the processing of personal data on Reejig’s software. Reejig’s Services provide functionality to enable the customer to respond to that request, but Reejig’s Data Processing Addendum also commits to provide reasonable assistance if needed.
Has Reejig appointed a Data Protection Officer?
Yes. Stephen Hanthorn is Reejig’s Data Protection Officer. He can be reached at privacy@Reejig.com.
Please provide an overview of how Reejig incorporates the principles of “privacy by design” into its product development.
Reejig works to incorporate privacy and data protection concepts from the inception of each new service or feature it offers, as well as existing offerings. Product managers and engineers who design our products are trained at least annually on data protection. In addition, Reejig’s software and services is supported by Reejig’s Head of Legal & Data Protection Officer who is knowledgeable about data protection and privacy, and who reviews and advises on the product’s functionality. Also, Reejig regularly considers input from its customers when designing and refining product functionality.
Please provide details of how Reejig is addressing its accountability and governance obligations under data privacy laws.
Reejig commits to meeting its accountability and governance obligations under applicable law and will take all appropriate related measures. These measures include implementing appropriate technical and organizational security measures (more fully described here: Reejig Security), undertaking privacy impact assessments (where appropriate) and maintaining records of processing, among others.
How does Reejig audit compliance with data protection controls?
Reejig’s legal team works closely with Reejig’s product developers on Reejig’s ‘privacy by design’ privacy strategy to ensure that it meets all of Reejig’s data protection obligations.
To ensure that our privacy commitments remain true over time, Reejig has a comprehensive range of compliance and internal accountability measures to ensure we protect Personal Data where it is accessed, stored, or processed such as our internal policies and standards and employee training.
Are Reejig employees bound by confidentiality obligations?
Yes, Reejig commits in its Data Processing Addendum to ensure that personnel have been appropriately trained, are reliable, and enter into confidentiality agreements. Employees also regularly undergo data protection and privacy training.
Reejig is committed to complying with all applicable laws governing the privacy,security, and treatment of its customers’ data. This includes existing and emerging laws in the United States, European Union, and other jurisdictions. Because these may vary across countries, Reejig has prepared these Frequently Asked Questions(“FAQs”) addressing common data privacy inquiries from our international customers and partners regarding Reejig’s position on government surveillance.
FAQ 1 – Does Reejig comply with the GDPR and other data privacy protection laws?
▪ Reejig complies with the local data privacy laws in each of the countries where we operate. Our internal policies are designed to protect our customers’ data in accordance with the local data privacy laws in the countries where their data is stored. This includes complying with the GDPR if customer data is subject to the GDPR.
FAQ 2 – Where does Reejig store European customers’ data?
▪ Reejig stores all European customers’ data on servers that are in the European Economic Area (EEA), which is governed by GDPR if a European customer so chooses. Reejig complies with the local data privacy laws,including GDPR, in each of the countries where customers’ data are stored.
FAQ 3 – Does Reejig transfer European customers’ data to recipients in the U.S.?
▪ Currently, implementation services are provided from the United States.Otherwise, Reejig does not transfer European customers’ data to a recipient the U.S. for processing either by Reejig itself or by any other dataprocessor. Reejig ensures that all personal data is handled, processed,transferred, and stored in accordance with GDPR, including with the use of the latest Standard Contractual Clauses that the European Commission has approved for ensuring appropriate data protection safeguards.
FAQ 4 – Does Reejig use encryption to protect European customers 'data?
▪ Yes, Reejig encrypts all customer data both as data are stored on servers(i.e., at rest) and data they are transferred (i.e., in transit) to another entity.
FAQ 5 – Does Executive Order 12333 require Reejig to participate inU.S. Government surveillance activities?
▪ Executive Order 12,333 governs the U.S. intelligence community’s foreign surveillance and collection activities. It does not authorize intelligence collection against U.S.-based targets or require U.S. companies like Rejigs US subsidiary to participate in intelligence gathering. Reejig has no role in or control over any U.S. intelligence community activities.
FAQ 6 – Does the Foreign Intelligence Surveillance Act (“FISA”) require Reejig to participate in U.S. Government surveillance activities?
▪ FISA is designed to investigate foreign spies and terrorist organizations operating within the United States. The U.S. Government can only obtain information under FISA through a warrant issued by an independent federal court. Reejig has not received such warrants, does not anticipate receiving any such warrants, and reserves the right to challenge them through juridical means when necessary.
FAQ 7 – Does Section 702 of FISA apply to Reejig?
▪ Section 702 of FISA authorizes the U.S. government to apply to an independent federal court for a warrant to collect communications from electronic communications or internet service providers for the purpose of investigating foreign spies and terrorist organizations. Reejig is not unelectronic communications or internet service provider and has never received a Section 702 warrant. In addition, based on public authorities andReejig’ experience, the personal data that Reejig maintains is highly unlikely to be of any interest to U.S. foreign intelligence investigation.
▪ Consistent with the EDPB’s recent recommendations on measures that supplement transfer tools, Reejig has based this assessment on its own documented practical experiences, public statements issued by the U.S.government, the documented experiences of other actors that process similar personal data, and publicly reported cases evidencing the past application of U.S. national security laws, including FISA Section 702. Furthermore, as the U.S. Department of Justice, the Office of the Director of National Intelligence, and the Department of Commerce made clear in a joint White Paper issued in September 2020, companies like Reejig that offer“ ordinary commercial products or services,” and whose data transfers“involve ordinary commercial information like employee, customer, or sales records,” have “no basis to believe U.S. intelligence agencies would seek to collect that data” through FISA Section 7021.
FAQ 8 – Does the USA PATRIOT Act and its successor laws require Rejig to participate in U.S. Government surveillance activities?
▪ These laws are designed to investigate money laundering and terrorist financing. Collecting information under these laws typically requires a court order, geographic targeting order, or national security letter. Reejig has not received such orders, does not anticipate receiving any such orders, and reserves the right to challenge them through juridical means when necessary. Based on public authorities, the type of personal data that our customers generally collect and place into Reejig’ software is not of interest to U.S. intelligence agencies.
FAQ 9 – Does Reejig voluntarily participate in any U.S. Government or surveillance programs, including those administered by the National Security Agency (“NSA”)?
▪ Reejig is not a U.S. Government contractor, does not conduct business with the U.S. intelligence community, and does not knowingly or voluntarily participate in any U.S. Government intelligence or surveillance programs,including surveillance and data collection programs administered by the NSA.
FAQ 10 – Does Reejig provide any customer data to any intelligence agencies?
▪ Reejig does not voluntarily provide customer data with any U.S. or foreign intelligence agencies. Obtaining access to U.S.-based customer data would require a court order or similar directive under U.S. law. Reejig has never received, and does not anticipate receiving, such an order in connection with intelligence activities.
FAQ 11 – Does Reejig provide metadata or other similar content to U.S.intelligence agencies?
▪ Reejig does not provide customer metadata to any intelligence agencies or participate in any government programs involving the bulk collection of metadata. Obtaining access to U.S.-based customer metadata typically requires a court order under U.S. law. Reejig has never received, and does not anticipate receiving, such an order in connection with intelligence activities.
FAQ 12 – Does Reejig share customer data stored outside the United States with any U.S. intelligence agencies?
▪ Reejig’s customers control how and where their data is stored and shared.We do not relocate customer data unless a customer specifically directs us todo so, and such activities are authorized under local privacy laws. Nor do we share customer data with any government agency unless we are required to do so under applicable local laws.
FAQ 13 – Does Reejig build any “backdoors” into its software, source code, or systems that would allow U.S. intelligence agencies to access customer data?
▪ Reejig is committed to protecting the privacy and security of its customer's data, regardless of where that data is located. We do not provide any government agencies with software source code, encryption keys, or other forms of access for the purpose of accessing customer data. Reejig has never received, and does not anticipate receiving, requests for “backdoor” access to its software and systems.
FAQ 14 – Does Reejig work with any vendors, suppliers, or other business partners that participate in intelligence and surveillance programs?
▪ Reejig’s business partners are commercial enterprises. As such, we are not aware of any vendors or suppliers participating in such programs. Even if our business partners were engaged in such activities, however, our systems are designed to prevent them from accessing customer data without the customer’s prior authorization. As noted, Reejig uses encryption for data at rest and in transit and uses Standard Contractual Clauses that the European Commission has approved for ensuring appropriate data protection safeguards.
FAQ 15 – Is Reejig subject to any other laws that would allow governments access to customer data?
▪ Like any company, Reejig is subject to the local laws that apply in the countries where it stores customer data. This means that Reejig may occasionally need to comply with court orders, subpoenas, or search warrants related to routine law enforcement activities. Such measures are consistent with the GDPR’s long standing law enforcement exceptions.
FAQ 16 – How will Reejig protect customer data during law enforcement investigations?
▪ Reejig believes that any government request should be directed to the appropriate Reejig customer that owns the data.
▪ Reejig will work with its legal advisors to determine whether court orders,subpoenas, or other agency directives are authorized under the relevant national laws. If such orders are not consistent with applicable local law, thenReejig reserves the right to challenge them through judicial action or other means.
▪ If Reejig receives a government request for customer data, Reejig will investigate: (1) whether Reejig can seek interim measures to suspend enforcement of the government request until Reejig’ challenge has been resolved; (2) whether (a) applicable law prohibits Reejig from notifying the affected customer of the government request prior to producing the requested information, and if not, such notice will include all relevant information that Reejig is legally permitted to provide to the customer, and(b) if a government request purports to require Reejig to delay customer notice indefinitely, whether Reejig can challenge it; and (3) whether, if a law enforcement or government agency contacts Reejig, Reejig can inform the agency that it is merely a processor of its customers’ data, and redirect the agency to make the request directly to the relevant customer.
Protecting your privacy and keeping your Personal Information (as hereinafter defined) safe is very important to us. This Privacy Policy describes how we handle the Personal Information provided to us, or otherwise collected by us, including through our website (the “Site”) or in connection with our software as a service application and platforms (the “Software Solution” and collectively with the Site, the “Services”). In this Privacy Policy, Reejig, we, us, or our means Reejig Pty Ltd., ABN 75 631 012 318, a private limited company established and resident under the laws of Australia, and Reejig Corp. a Delaware corporation. This Privacy Policy also describes certain legal rights you may have, subject to applicable law, and how you can exercise them.
For purposes of this Privacy Policy, “Personal Information” means information that relates to an identified or identifiable individual (such as a name, email address, or photograph) or as otherwise defined under applicable law.
This document is designed to help you understand how we collect, use, and safeguard your Personal Information. To make it easier to navigate, we have organized the policy into sections, as set out below.
Section A provides an overview of how we collect, process, and store your data. It also outlines what rights you have as a data subject, and how to contact us if you require more information.
While our Global Privacy Principles generally apply to all our processing, these are subject to local data protection laws that may differ depending on your location. Please refer to Section B to understand how your individual rights may vary depending on where you’re located.
When it comes to your personal information, Reejig may act in one of two roles: as a Data Controller or as a Data Processor.
When Reejig is a Data Controller
When Reejig acts as a Data Controller, it means we are responsible for deciding how and why your Personal Information is collected and used. This typically happens in situations where you provide your information directly to us, for example, when you:
When Reejig is a Data Processor
In many cases, Reejig acts as a Data Processor. This happens when we process your Personal Information on behalf of one of our customers, who is the Data Controller. This typically occurs in situations where your information is provided to us by our customers or we collect it on their behalf, such as when:
As a Data Processor, we process your Personal Information strictly according to the instructions of our customer and the terms of the agreement between us. We do not decide how your data is used or why it is collected; that decision is made by the Data Controller. Our responsibility is to ensure that your data is handled securely, accurately, and only for the purposes set by the Data Controller. If you believe we process your Personal Information on behalf of one of our customers, please contact the customer directly, and we will support them in responding to your request.
The types of Personal Information we may collect about you include:
Information Collected Directly – We may collect information that you provide to us voluntarily, such as your name, contact details, email address, phone number, or your preferences and/or opinions. Typically, you provide us with this information by completing forms (including on third-party platforms), subscribing for email updates, registering for events we host, or requesting a demo of our Software Solution. We may also collect information relating to your organizational affiliation and job title through our correspondence with you during the course of conducting business.
Information Collected via Customers – To the extent permitted by our agreements with our customers, we may collect certain information such as your name, contact details, work experience, general work location, education, photo, social network information (such as a LinkedIn profile), and relevant skills and certifications to generate a personalized career pathway for you and to improve and train our AI models if you are an employee of a customer, or a candidate for employment via one of our customers.
Information Collected Through Automated Means via Your Interaction with the Site – We may collect additional information through automated means as you browse our Site. This includes information about your access and use of our Site, such as your browser session and geo-location data, device and network information, statistics on page views and sessions, acquisition sources, search queries and/or browsing behavior, and your communications with our Site. We may use cookies and similar technologies to manage and track this information. Please see the Cookies section for more information about how we use these technologies.
Information Collected from Third-Party Sources – To provide our Software Solution, we also collect certain publicly available professional information about individuals, such as education, work experience, skills, geographic location, and endorsements. We only collect and process such data where the individual has actively selected to make this data public in service of their career, network, or profession.
Reejig may collect, hold, use and disclose your Personal Information for the following purposes:
Information from Third Parties: If we receive Personal Information about you from a third party, we will use and protect it as set out in this Privacy Policy. If you are a third party providing Personal Information about somebody else, you represent and warrant that you have such person’s consent to provide the Personal Information to us.
We may share Personal Information about you with certain third parties in the following circumstances:
Links to Third-Party Services:Our Site may contain links to other websites, services, and applications (Third-Party Services). This Privacy Policy does not apply to those Third-Party Services. We do not have any control over them, and we are not responsible for the protection and privacy of any Personal Information which you provide to or through them.
Information from Third Parties: If we receive Personal Information about you from a third party, we will use and protect it as set out in this Privacy Policy. If you are a third party providing Personal Information about somebody else, you represent and warrant that you have such person’s consent to provide the Personal Information to us.
Personal Information we collect may be stored and processed for the purposes set out in this Privacy Policy in Australia, the United States, United Kingdom, Europe, where our customers decide to store their instance of our software, any other country where we have operations, or where we engage vendors or service providers including the Philippines and India. These countries may not have the same data protection laws as the country in which you originally provided the data.
Limiting Information We Collect. You can control the information we collect about you by choosing not to provide certain information in the case of the Site. However, this means that you may not be able to take full advantage of our Site and we may not be able to provide you with the product information you have requested.
Right to Know/Access: You may request details about the Personal Information that we hold about you using our contact details in section A12 below. We may request that you verify your identity to determine that you have the proper authorization to make the request. We may also refer you to the Data Controller, if we are processing your information on behalf of a customer. In some circumstances, we may refuse to provide you with such information if:
Right to Correct: If you believe that any Personal Information we hold about you is inaccurate, out of date, incomplete, irrelevant or misleading, please contact us using the details below and we will take reasonable steps to correct it. We may also refer you to the Data Controller, if we are processing your information on behalf of a customer.
Right to Delete/Be Forgotten: In some instances, you may be eligible to request that we delete your data. We will consider all requests and provide our response within the period stated by applicable law. We may also refer you to the Data Controller, if we are processing your information on behalf of a customer. Please note, however, that certain information may be exempt from such requests in some circumstances, which may include if we need to keep processing your information for our legitimate interest or to comply with a legal obligation.
Right to Restrict Cookies/Do Not Track: Reejig does not currently change its behavior in response to web browser “do not track” signals. However, you can configure most browsers to reject cookies or to notify you when you are sent a cookie, giving you a chance to decide whether to accept it. You can consult the help section of your browser to find out how to do this. Please note that if you choose to remove or reject cookies, you may not be able to use all features and functionality on the Site.
Right to Complain: If you believe that we have breached applicable data protection law or this Privacy Policy and wish to make a complaint, please contact us using the details below and provide us with full details of the alleged breach. We will promptly investigate your complaint and provide you with a response within a reasonable time (usually within 30 days). You also have the right to lodge a complaint with the authorities applicable to your situation. However, we invite you to contact us with any concern, as we would be happy to try to resolve it directly.
Right to Opt Out/Unsubscribe: If you would like to opt-out of receiving our marketing communications, you may do so at any time by contacting us using the details below or following the “unsubscribe” instructions provided in the communication. Please be aware that it may take up to 10 days for us to process your request, and you may continue receiving promotional communications form us during that period. If you opt out of receiving such communications, please be aware that we may continue to send you non-promotional emails (such as emails related to our business relationship or emails about changes to our legal terms). If you have previously agreed for us to use your Personal Information for direct marketing purposes, you may change your mind at any time by contacting us using the details below.
Reejig has implemented security controls and procedures for protecting your Personal Information from misuse, interference, unauthorized access, modification, or disclosure. This is done using information technology security systems, internal staff access controls, ongoing security training and independent privacy and security audits. We have established procedures for identifying and reporting privacy breaches and for receiving and responding to complaints and inquiries. We also conduct regular reviews of our Privacy Policy and the practices, procedures, and systems implemented under our Privacy Framework.
Although we make reasonable efforts to protect your Personal Information from loss, misuse, or alteration by third parties, you should be aware that there is always some risk involved in transmitting information over the internet and storing information electronically. Reejig cannot and does not guarantee absolute security.
We only keep your Personal Information for so long as reasonably necessary for the purposes described in this Privacy Policy, as required by law, or as necessary to resolve disputes and enforce our rights and agreements. To dispose of Personal Information, we may anonymize it, delete it, or take other appropriate steps. Data may persist in copies made for backup and business continuity purposes for limited, but additional time periods after deletion due to all instances of your Personal Information not being deleted all at once.
Our Site uses ‘cookies’ to help you personalize your online experience. A cookie is a text file or a packet of information that is placed on your hard disk by a web page server to identify and interact more effectively with your computer. Cookies are uniquely assigned to you and one of their primary purposes is to provide a convenience feature to save you time.
One purpose of a cookie is to tell the web server that you have returned to a specific page. For example, a cookie may help Reejig record your specific information on subsequent visits. When you return to the same website, information you previously provided can be retrieved, so you can easily use the Reejig features that you have customized. Cookies may also allow third parties, such as Google, to cause our content or advertisements to appear on your social media and online media feeds as part of our retargeting campaigns. If you choose to provide our Site with Personal Information, this information may be linked to the data stored in the cookie.
Our Site may also use web beacons in conjunction with cookies. Web beacons (also known as Clear GIFs) are small pieces of code placed on a web page to monitor a visitor’s behavior and collect data about the visitor’s viewing of a web page. For example, web beacons can be used to count the users who visit a web page or to deliver a cookie to the browser of a visitor viewing that page.
Most web browsers automatically accept cookies, but you can usually modify your browser setting to decline cookies, if you prefer. If you choose to decline cookies, you may not be able to fully experience the interactive features of the Reejig website.
Google has developed the Google Analytics opt-out browser add-on. If you want to opt-out of Google Analytics, you can download and install the add-on for your browser here.
You may withdraw Your consent at any time by deleting Your Cookies using your internet browser settings.
Additionally, some advertising networks offer a way to opt out of targeting advertising. If You would like to find out more information, please visit https://www.youradchoices.com/ and/or http://www.youronlinechoices.com.
Our Services are intended for adults, and we do not knowingly collect Personal Information from children. If you are a parent or legal guardian and think that your child under 13 (or a higher age threshold where applicable) has given us Personal Information without your consent, please contact us at privacy@reejig.com.
We may modify this Privacy Policy from time to time. The most current version of the Privacy Policy will govern our collection, use, and disclosure of information about you. We recommend you check our Site regularly to ensure you are aware of our current Privacy Policy. If we make material adverse changes to this Privacy Policy, we will notify you by email and/or by posting a notice of the changes in this Privacy Policy prior to or on the effective date of the changes. By continuing to access or use the Site after those changes become effective, you agree to the revised Privacy Policy to the extent permitted by applicable law.
We are committed to protecting your Personal Information and ensuring that your privacy is respected at all times. If you’re ever unsure about how your data is being handled, please feel free to reach out to us or the relevant Data Controller. You can learn more about how to submit a data rights request, or appeal denial of a request, through Reejig’s Support Center. You may also send your question or request by emailing our Data Protection Officer at privacy@Reejig.com.
While our Global Privacy Principles generally apply to all our processing, these are subject to local data protection laws that may differ depending on your location. Please review the section that applies to your location for more details.
This website (Site) is operated by Reejig Pty Ltd ABN 75 631 012 318 (we, our or us). By accessing and/or using our Site, you agree to these terms of use and our Privacy Policy (Terms). We may vary these terms from time to time by publishing an updated version on our Site. We recommend that you check these Terms regularly to ensure that you are aware of any changes as materials and information on this Site are subject to change without notice.
In using this Site, you must not:
The Content on this Site is not comprehensive and is for general information purposes only. It does not take into account your specific needs, objectives and circumstances, and it is not advice. While we use reasonable attempts to ensure the accuracy and completeness of the Content, we make no representation or warranty in relation to it, to the maximum extent permitted by law.
We grant you a non-exclusive, royalty-free, revocable, worldwide, non-transferable license to use our Site in accordance with these Terms. All other uses are prohibited without our prior written consent.
Unless otherwise stated, we own or license all rights, title and interest (including intellectual property rights) in our Site and all of the Content. Your use of our Site and any of the Content does not grant or transfer to you any rights, title or interest them. You must not:
Our Site may contain links to websites operated by third parties. Unless expressly stated otherwise, we do not control, endorse or approve, and are not responsible for, the content on those websites. You should make your own investigations with respect to the suitability of those websites.
To the maximum extent permitted by law, you must indemnify us, and hold us harmless, against any Liability suffered or incurred by us arising from or in connection with your use of our Site or any breach of these Terms or any applicable laws by you. This indemnity is a continuing obligation, independent from the other obligations under these Terms, and continues after these Terms end. It is not necessary for us to suffer or incur any Liability before enforcing a right of indemnity under these Terms.
To the maximum extent permitted by law, we are not responsible for any loss, damage or expense, whether directly or indirectly suffered by you or any third party, arising from or in connection with your use of our Site and/or the Content, including if the Content is incorrect, incomplete or out-of-date.
If a provision of these Terms is held to be unenforceable, that provision must be read down as narrowly as necessary to allow it to be valid or enforceable. If it is not possible to read down (in whole or in part) a provision, that provision (or that part of that provision) shall be severed without affecting the validity or enforceability of the remainder of that provision or the rest of these Terms. These Terms are effective until terminated by us, which we may do at any time and without notice to you. In the event of termination, all restrictions imposed on you by these Terms and limitations of liability set out in these Terms will survive. Your use of our Site and these Terms are governed by the laws of New South Wales, Australia, and you irrevocably submit to the exclusive jurisdiction of the courts of New South Wales, Australia.