Términos, condiciones y política de privacidad

Shadowtrack Technologies, Inc., de ahora en adelante llamada Shadowtrack®, ha implementado salvaguardas para proteger la información confidencial. Shadowtrack® no vende, alquila ni divulga de ningún modo nuestras listas de correo, de inscritos, de agencias, de funcionarios, ni ninguna información sobre los visitantes de nuestro sitio.

Shadowtrack® no realiza un seguimiento de los visitantes o inscritos a través de nuestro sitio web corporativo. Nuestro sitio captura información limitada sobre las visitas a nuestro sitio para analizar los patrones generales de tráfico que determinan la procedencia de las visitas, únicamente con fines de marketing y mantenimiento. Si decide enviarnos un correo electrónico y proporcionar información personal identificable sobre usted, no utilizaremos esa información para ningún otro propósito que no sea responder a su consulta, a menos que usted dé su consentimiento.

Shadowtrack® se compromete a manejar su información con los más altos estándares de seguridad de la información. Los datos de su tarjeta de crédito se almacenan únicamente de forma encriptada. Restringimos el acceso a su información personal identificable a los empleados que necesitan conocerla para poder prestarle servicios. Mantenemos salvaguardas físicas, electrónicas y de procedimiento para proteger su información personal no pública.

Shadowtrack® tiene un motor de procesamiento de tarjetas de crédito que combina Secure Socket Layer (SSL), encriptación PGP y tecnologías propias para procesar los pagos de forma fácil y segura. Además, el procesador está certificado por el Programa de Seguridad de la Información del Titular de la Tarjeta (CISP) de Visa y se adhiere al Estándar de Seguridad de Datos de la Industria de las Tarjetas de Pago (PCI). CISP y PCI garantizan aún más la seguridad de la información de las cuentas de los clientes y tienen por objeto proteger los datos de los titulares de las tarjetas.

La seguridad de su cuenta de Shadowtrack® también se basa en la protección de su contraseña. Shadowtrack® nunca le pedirá que nos envíe su contraseña u otra información sensible por correo electrónico, aunque puede que le pidamos que introduzca este tipo de información en el sitio web de Shadowtrack®.

Esta política de privacidad rige el uso de la aplicación de software Shadowtrack® para dispositivos móviles. La aplicación se utiliza como una herramienta para cumplir con los requisitos ordenados por el tribunal, la desviación, la libertad condicional o la libertad condicional. La aplicación enviará alertas a su dispositivo móvil para completar una llamada de verificación, verificación de ubicación, entrevista, videoconferencia, y/o prueba de sobriedad. La aplicación obtiene información sobre su historial de seguimiento. El registro con nosotros es opcional. Sin embargo, tenga en cuenta que su oficial asignado o agente supervisor será notificado si usted no completa su inscripción o cualquier parte del programa Shadowtrack®.

Shadowtrack® tiene un servicio de videoconferencia llamado ShadowView que sólo está disponible para los inscritos y los usuarios/anfitriones autorizados (oficial, trabajador del caso, etc.).

  • Las reuniones de ShadowView sólo pueden ser iniciadas por el anfitrión para obtener el mayor nivel de control y seguridad.
  • Cuando se incorpore a una reunión, es posible que la cámara de vídeo y el micrófono estén activados por defecto. Tenga en cuenta que los participantes pueden verle y oírle en cuanto se incorpore a la reunión. Si no quieres compartir el sonido o el vídeo, debes avisar al anfitrión inmediatamente.
  • ShadowView permite al anfitrión grabar la reunión para futuras consultas. Shadowtrack® no guarda una copia de esta grabación. Sin embargo, el anfitrión puede descargar la grabación para sus archivos. Si no desea que el anfitrión grabe la sesión, debe comunicárselo inmediatamente.
  • Ten cuidado antes de compartir tu pantalla. La mayoría de los servicios tienen funciones que te permiten compartir con el grupo lo que hay en tu pantalla, por ejemplo, una presentación de diapositivas. Pero antes de compartir tu pantalla, asegúrate de que no tienes documentos abiertos, ventanas del navegador u otras cosas en tu pantalla que no quieres que vean los demás.
  • Si la confidencialidad es crucial, la videoconferencia puede no ser la mejor opción. Ningún servicio de conferencias puede garantizar la seguridad de su información, así que considere otras alternativas si necesita hablar de temas especialmente delicados con su anfitrión.
  • ShadowView incluye medidas de seguridad para mantener la privacidad de la información. No compartimos su información con terceros.
  • ShadoView recomienda actualizar a la última versión del software (Navegador, iOS o Android) con parches y correcciones. Acepta solo las actualizaciones directamente desde el sitio web del servicio.
  • Al utilizar este servicio, usted indemniza a Shadowtrack® y a todas sus filiales por cualquier incumplimiento en el intercambio de datos por parte del anfitrión.

Shadowtrack® tiene un servicio de reconocimiento facial llamado ShadowFace que sólo está disponible para los inscritos y los usuarios autorizados (oficial, trabajadores sociales, etc.). El propósito de este servicio es identificar positivamente a un Inscrito durante una sesión de verificación para que el oficial asignado, el tribunal o el agente supervisor puedan confirmar que el Inscrito está cumpliendo con sus requisitos de supervisión comunitaria ordenados por el tribunal.

  • Durante el proceso de inscripción, la aplicación solicitará al inscrito que capture una imagen de su rostro (Imagen de inscripción)
  • La imagen de inscripción almacenada se comparará con una imagen de verificación cuando la aplicación lo solicite durante una sesión de verificación para identificar positivamente al inscrito o detectar intentos de suplantación
  • Los datos de reconocimiento no se comparten con ningún tercero que no sea el funcionario asignado, el tribunal o el agente supervisor del afiliado
  • Los datos faciales recogidos sobre el inscrito son el tamaño, el cabeceo, el balanceo, la guiñada y los puntos de referencia clave
  • Todos los datos de reconocimiento facial se almacenan de forma segura en un servidor independiente en la nube sin ninguna información personal identificable
  • Todos los datos de reconocimiento facial se almacenan durante un período de hasta siete años (7) después de que el inscrito sea retirado del programa. Este período de retención es dictado por la agencia supervisora
  • El afiliado debe aceptar la opción de este servicio aceptando el lenguaje claro de la aplicación durante el proceso de inscripción

When you receive location alerts the mobile application will use GPS technology (or other similar technology) to determine your current location. We can share your tracking history with a court, probation officer, law enforcement, or anyone associated with your case. We will share your information with third parties only in the ways that are described in this privacy statement.

We may disclose User Provided and Automatically Collected Information: As required by law, such as to comply with a subpoena or similar legal process; when we believe in good faith that disclosure is necessary to protect our rights, protect your safety or the safety of others, investigate fraud, or respond to a government request; Our service providers do not have an independent use of the information we disclose to them and have agreed to adhere to the rules set forth in this privacy statement.

We will retain User-Provided data for as long as you use the Application and for a reasonable time thereafter. You can stop all collection of information by the Application easily by uninstalling the Application. If you uninstall or log out of the application your assigned officer or supervising agent will be notified.

We are concerned about safeguarding the confidentiality of your information. We provide physical, electronic, and procedural safeguards to protect information we process and maintain. Please be aware that, although we endeavor to provide reasonable security for information we process and maintain, no security system can prevent all potential security breaches.

By using the Application, you are consenting to our processing of your information as set forth in this Privacy Policy now and as amended by us. “Processing,” means using cookies on a computer/handheld device or using or touching information in any way, including, but not limited to, collecting, storing, deleting, using, combining and disclosing information.

If you have any questions or concerns about our policy, please contact Shadowtrack® via email at support@Shadowtrack.com or at 877-396-0385. Our corporate office is located at ONE LAKEWAY 3900 North Causeway Boulevard Suite 1200, Metairie, LA 70002

Cookies Policy

We use cookies and similar technologies on our website to provide you with a better browsing experience, analyze site traffic, and personalize content. By continuing to browse our site, you consent to our use of cookies as described in this policy.

What are Cookies:
Cookies are small text files that are stored on your device (computer or mobile device) when you visit our website. They help us remember your preferences, track your activity on our site, and improve your user experience.

Types of Cookies:
We use several types of cookies on our website:

Strictly Necessary Cookies:
These cookies are essential for our site to function properly. They enable you to navigate our site and use its features.

Analytics Cookies:
These cookies help us understand how you interact with our site, which pages you visit, and how long you stay on each page. We use this information to improve our site's performance and user experience.

Functional Cookies:
These cookies allow us to remember your preferences (such as your language or region) and provide enhanced, more personalized features.

Managing Cookies:
You can manage cookies through your web browser settings. Most browsers allow you to block or delete cookies, and you can also choose to accept or reject cookies on a site-by-site basis. However, please note that blocking or deleting cookies may affect your user experience on our site.

Third-Party Cookies:
We may also use third-party cookies on our website, such as those from Google Analytics and Google AdSense. These cookies are subject to the respective third-party privacy policies and are not governed by this cookies policy.

Updates to this Policy:
We may update this cookies policy from time to time to reflect changes in our use of cookies or legal requirements. We encourage you to review this policy regularly to stay informed about how we use cookies on our website.

If you have any questions or concerns about our cookies policy, please contact us at Support@shadowtrack.com.

Organizational Security

Information Security Program

  • We have an Information Security Program in place that is communicated throughout the organization. Our Information Security Program follows the criteria set forth by the SOC 2 Framework. SOC 2 is a widely known information security auditing procedure created by the American Institute of Certified Public Accountants.

Third-Party Audits

  • Our organization undergoes independent third-party assessments to test our security and compliance controls.

Third-Party Penetration Testing

  • We perform an independent third-party penetration at least annually to ensure that the security posture of our services is uncompromised.

Roles and Responsibilities

  • Roles and responsibilities related to our Information Security Program and the protection of our customer’s data are well defined and documented. Our team members are required to review and accept all of the security policies.

Security Awareness Training

  • Our team members are required to go through employee security awareness training covering industry standard practices and information security topics such as phishing and password management.

Confidentiality

  • All team members are required to sign and adhere to an industry standard confidentiality agreement prior to their first day of work.

Background Checks

  • We perform background checks on all new team members in accordance with local laws.

Cloud Security

Cloud Infrastructure Security

  • All of our services are hosted with [Amazon Web Services (AWS) | Google Cloud Platform (GCP)]. They employ a robust security program with multiple certifications. For more information on our provider’s security processes, please visit [AWS Security | GCP Security].

Data Hosting Security

  • All of our data is hosted on [Amazon Web Services (AWS) | Google Cloud Platform (GCP)] databases. These databases are all located in the [United States]. Please reference the above vendor specific documentation linked above for more information.

Encryption at Rest

  • All databases are encrypted at rest.

Encryption in Transit

  • Our applications encrypt in transit with TLS/SSL only.

Vulnerability Scanning

  • We perform vulnerability scanning and actively monitor for threats.

Logging and Monitoring

  • We actively monitor and log various cloud services.

Business Continuity and Disaster Recovery

  • We use our data hosting provider’s backup services to reduce any risk of data loss in the event of a hardware failure. We utilize monitoring services to alert the team in the event of any failures affecting users.

Incident Response

  • We have a process for handling information security events which includes escalation procedures, rapid mitigation and communication.

Access Security

Permissions and Authentication

  • Access to cloud infrastructure and other sensitive tools are limited to authorized employees who require it for their role.
  • Where available we have Single Sign-on (SSO), 2-factor authentication (2FA) and strong password policies to ensure access to cloud services are protected.

Least Privilege Access Control

  • We follow the principle of least privilege with respect to identity and access management.

Quarterly Access Reviews

  • We perform quarterly access reviews of all team members with access to sensitive systems.

Password Requirements

  • All team members are required to adhere to a minimum set of password requirements and complexity for access.

Password Managers

  • All company issued laptops utilize a password manager for team members to manage passwords and maintain password complexity.

Vendor & Risk Management

Annual Risk Assessments

  • We undergo at least annual risk assessments to identify any potential threats, including considerations for fraud.

Vendor Risk Management

  • Vendor risk is determined and the appropriate vendor reviews are performed prior to authorizing a new vendor.

Data Collection Policy

This Data Collection Policy describes how we collect, use, and protect the data that our users provide to us through our platform.

Data Collection Methods

  • We collect data through various methods, including:
  • Account registration: When you create an account with us, we collect your name, email address, phone number, and address.
  • Usage data: We collect data about your use of our platform, including the features you use, the time and duration of your usage, and your IP address.
  • Feedback and support requests: We collect data when you provide feedback or submit a support request, such as your name, email address, and the content of your feedback or request.
  • Payment information: If you choose to subscribe to our paid plans, we collect your payment information, such as your credit card number and billing address.

Types of Data Collected

  • We collect the following types of data:
  • Personal data: This includes your name, email address, phone number, street address, and billing information and if you are an Enrollee, we may collect location data.
  • Usage data: This includes data about how you use our platform.

Purpose of Data Collection

  • We collect data for the following purposes:
  • To provide and improve our platform and services.
  • To communicate with you about your account and provide customer support.
  • To process payments for our paid plans.
  • To analyze usage trends and improve the platform.

Legal Basis for Data Collection

  • We collect and process your data on the following legal bases:
  • Consent: We collect your consent to collect and process your data when you create an account with us.
  • Contract: We collect and process your data to fulfill our contractual obligations to you, such as providing access to our SaaS platform.

Data Retention

  • We retain your data for as long as necessary to fulfill the purposes for which it was collected. This includes retaining data to comply with legal obligations, resolve disputes, and enforce our agreements.

Data Security

  • We take data security seriously and have implemented appropriate technical and organizational measures to protect your data. This includes encryption, firewalls, access controls, and regular security audits and we are SOC 2 TYPE 2 Compliant.

Data Sharing

  • We do not share your data with third parties, except as necessary to fulfill our contractual obligations to you or as required by law.

User Rights

  • As a user of our platform, you have the right to access, rectify, or delete your data. You can exercise these rights by contacting us using the appropriate links on the website.

Policy Updates

  • We may update this Data Collection Policy from time to time.

Do Not Track (DNT) Policy

We respect the privacy of our users and understand that some users may prefer not to have their online activity tracked. Therefore, we have implemented a "Do Not Track" policy that allows users to opt-out of certain types of tracking on our website.

What is "Do Not Track" (DNT)?

"Do Not Track" is a feature in most web browsers that allows users to inform websites and online services that they do not want to be tracked. When a user enables the DNT feature, their browser sends a signal to websites indicating that the user does not want their online activity to be tracked. However, please note that there is no standard for how websites should respond to the DNT signal, and the effectiveness of DNT is therefore limited.

What types of tracking does our website use?

Our website uses certain types of tracking, such as cookies and analytics tools, to improve the user experience and to understand how users interact with our website. However, we do not use any tracking data for targeted advertising or other purposes that are not directly related to the operation of our website.

How do I opt-out of tracking on your website?

If you do not want your online activity to be tracked on our website, you can enable the DNT feature in your web browser. Please note that if you choose to enable the DNT feature, certain features of our website may not function properly.

Children's Online Privacy Protection Policy

We are committed to protecting the privacy of children who use our website. In accordance with the Children's Online Privacy Protection Act (COPPA), we do not knowingly collect or solicit personal information from anyone under the age of 13. If you are under 13, please do not attempt to register for our website or provide any personal information about yourself to us.

What personal information do we collect from children?

We do not knowingly collect personal information from children under the age of 13. If we discover that we have collected personal information from a child under the age of 13, we will promptly delete that information.

How do we use the personal information of children?

We do not use personal information collected from children for any purpose other than to respond to a specific request or inquiry from the child.

Do we share personal information with third parties?

We do not share personal information collected from children with third parties, except as necessary to respond to a specific request or inquiry from the child or as required by law.

How do we obtain parental consent?

We do not collect personal information from children under the age of 13 without obtaining verifiable parental consent. If a child under the age of 13 wishes to register for our services or provide personal information, we will ask the child's parent or legal guardian to provide verifiable consent. Verifiable consent may include providing a signed consent form via postal mail, email, or providing a credit card to verify the parent's identity.

How can parents review and delete their child's personal information?

Parents or legal guardians may review their child's personal information that we have collected by contacting us at the email address provided below. Parents or legal guardians may also request that we delete their child's personal information by contacting us at the same email address.

If you have any questions or concerns about our Children's Online Privacy Protection Policy, please contact us at Support@shadowtrack.com.

Revision 0504-20200607
5/25/2023 3:25 p.m.
Al hacer clic en "Aceptar", acepta que se almacenen cookies en su dispositivo para mejorar la navegación por el sitio, analizar el uso del mismo y ayudar en nuestros esfuerzos de marketing. Consulte nuestra política de privacidad para obtener más información.