Your Privacy Rights, Revision 1/1/2022
Scope and Consent
Collection of Personal Information
We collect the following types of personal information in order to provide you with the use of cloakedghost.com Services, and to help us personalize and improve your experience.
Information we collect automatically: cloakedghost.com does not automatically collect information when you visit the website. Viewing videos on select pages is subject to collection of your information through Google Adsense.
Information you provide to us: We may collect and store any information you provide us when you use cloakedghost.com Services, including when you make a payment through PayPal, download freeware content, participate in customer service discussions, chats, or dispute resolutions, or when you otherwise correspond with us regarding cloakedghost.com Services.
How We Use the Personal Information We Collect
Our primary purpose in collecting personal information is to provide you with a secure, smooth, efficient, and customized experience. We may use your personal information to:
•provide cloakedghost.com Services and customer support;
•process transactions and send notices about your transactions;
•verify your identity;
•resolve disputes, and troubleshoot problems;
•manage risk, or to detect, prevent, and/or remediate fraud or other potentially prohibited or illegal activities;
•detect, prevent or remediate violations of policies or applicable user agreements;
•improve cloakedghost.com Services by customizing your user experience;
•manage and protect our information technology infrastructure;
We may contact you via electronic means to notify you regarding your transactions, to troubleshoot problems with your transactions, to resolve a dispute, to collect monies owed, or as otherwise necessary to service you. Finally, we may contact you as necessary to enforce our policies, applicable law, or any agreement we may have with you.
cloakedghost.com is a cookie-free website. Accessing cloakedghost.com does not subject you to local storage of information.
How We Protect and Store Personal Information
Our operations are supported by a network of computers, cloud-based servers, and other infrastructure and information technology, including, but not limited to, the use of third-party service providers.
We protect your information using physical, technical, and administrative security measures to reduce the risks of loss, misuse, unauthorized access, disclosure and alteration.