For purposes of this Agreement, “Site” refers to the Company’s website, which can be accessed at https://join.peeramid.app or through our mobile application.
“Service” refers to the Company’s services accessed via the Site, in which users can join the waitlist for our mobile-app, access our blog, and learn more about Us.
The terms “we,” “us,” and “our” refer to the Company.
“You” refers to you, as a user of our Site or our Service.
I. INFORMATION WE COLLECT
We collect “Non-Personal Information” and “Personal Information.” Non-Personal Information includes information that cannot be used to personally identify you, such as anonymous usage data, general demographic information we may collect, referring/exit pages and URLs, platform types, preferences you submit and preferences that are generated based on the data you submit and number of clicks. Personal Information includes your email, school affiliation (if applicable), which you submit to us through the registration process at the Site.
Information collected via Technology
· Time spent on our Product/s
· Which of our Product/s you visit and/or use
· Features most used
· Desired actions you’ve completed (conversions)
The Company may use both persistent and session cookies; persistent cookies remain on your computer after you close your session and until you delete them, while session cookies expire when you close your browser. For example, we store a persistent cookie to track how long you stay on a particular page or which pages you visited.
Information you provide us by registering for an account
Things you and others do and provide.
- Information and Content you provide. We collect the content, communications, and other information you provide when you use our Products, including: (i) when you sign up for an account, (ii) make a comment, (iii) create or share content, (iv) communicate and messages with others. This can include information in or about the content you provide, such as the date a file was created or the location of a video or audio. It may also include what you see through the features which we provide, such as our “trending”, so that we may suggest content that you might like. Our systems automatically process content and communications you and others provide for the purposes described below. Learn more about how you can control who may see the content/things you share by clicking here.
- Data with special protections: You may choose to provide information in your Peeramid profile fields or Reflection Events about your mental health status. This and other information (such as racial or ethnic origin, philosophical beliefs, or trade union membership) could be subject to special protections under the laws of your country.
- Comments. When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
- Media. If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.
- Networks and connections. We collect information about people, accounts, hashtags, and Peer-Zone groups you are connected to and how you interact with them across our Products, such as people you communicate with the most or groups you are part of. We also collect information you choose to upload, sync, or import in from a device (such as media, books, and articles), which we use for things like helping you and others find people and/or resources and tools which are like-minded and for the other purposes listed below.
- Your usage. We collect information about how you use our Products, such as the types of content you view or engage with; the features you use; the actions you take; the accounts or people you interact with; and the frequency, time, and duration of your activities. For example, we log when you’re using and have last used our Products, and what lessons or posts, videos, and other content you view on our Products. We also collect information about how you use our features, such as our camera.
- Things others do and information they provide about you. We also receive and analyze content, communications, and information that other people provide when they use our Products. This can include information about you, such as when others share or comment on a video of you, send a message to you, or upload, sync, or import your contact information.
We collect information from and about the computers, phones, and other web-connected devices you use that integrate our Products, and we combine this information across different devices you use, as described below. For example, we use information collected about your use of our Products on your phone to better personalize the content or features you see when you use our Products on another device, such as your phone or tablet, or to measure where you took an action in response to content we showed you on your laptop on a different device. Information which we obtain from these devices include:
- Device attributes: information such as the operating system, hardware, and software versions, battery level, signal strength, available storage space, browser type, app and file names and type, and plugins.
- Device operations: information about operations and behaviors performed on the device, such as whether a window is foregrounded or backgrounded, or mouse movements (which can help distinguish humans from bots).
- Identifiers: unique identifiers, device IDs, and other identifiers, such as from accounts you use (or identifiers unique to Peeramid Labs Products associated with the same device or account).
- Device signal: Bluetooth signals, and information about nearby Wi-Fi access points, beacons, and cell towers.
- Data from device settings: information you allow us to receive through device settings you turn on such as your camera, photos, or microphone.
- Network and connections: information such as the name of your mobile operator or ISP, language, time zone, mobile phone number, IP address, connection speed and, in some cases, information about other devices that are nearby or on your network, so we can do things like help you stream a video from your phone or your laptop.
- If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
- If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
- When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
- If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.
Information from partners.
Universities and companies, if affiliated, can send us information if required for further student assessment through the Peeramid Administrative Tools they use, including our APIs and SDKs. These partners provide information about your activities off of our Products–including information about how you use their services and key indicators within their system for underlying prediction mechanisms on academic success measures–whether or not you have an account or are logged into our Products. For example, an academic success administrator could use our API to tell us whether you’ve registered for classes or grade point average (GPA) drops below a threshold.
Partners receive your data when you visit or use their services or through third parties they work with. We require each of these partners to have lawful rights to collect, use, and share your data before providing any data to us.
The Site and the Service are not directed to anyone under the age of 13. The Site does not knowingly collect or solicit information from anyone under the age of 13, or allow anyone under the age of 13 to sign up for the Service. In the event that we learn that we have gathered personal information from anyone under the age of 13 without the consent of a parent or guardian, we will delete that information as soon as possible. If you believe we have collected such information, please contact us at firstname.lastname@example.org.
II. HOW WE USE AND SHARE INFORMATION
We use the information we have (subject to choices you make) as described below and to provide and support the Peeramid Products and related services described in the Peeramid Terms. This is how we use the information:
Provide, personalize, and improve our Products.
We use the information we have to deliver our Products, including to personalize your features and content (including your Peeramid feed), and make suggestions for you (such as groups or events you may be interested in or topics you may want to learn more about) on and off our Products. To create personalized Products that are unique and relevant to you, we use your preferences, interests, and activities based on the data we collect and learn from you and others (including any data with special protections you choose to provide); how you use and interact with our Products; and the people, places, or things you’re connected to and interested in on and off our Products. Learn more about how we use information on you to personalize your experience, including features, content, and recommendations in the Peeramid Products.
- Information across Peeramid Products and devices: We connect information about your activities on different Peeramid Products and devices to provide a more tailored and consistent experience on all Peeramid Products you use, wherever you use them. For example, we can suggest that you join a peer zone on the Peeramid app that includes like-minded people you communicate with from your Peeramid feed or lesson reflections. We can also make your experience more seamless, for example, by automatically filling in your registration information (such as your email) from one Peeramid Product when you sign up for an account on a different Product.
- Location-related information: We use location-related information-such as university/college and business affiliations, if applicable, to provide, personalize, and improve our Products, including features and resources for yourself and others’ use of Peeramid Products.
- Product research and development: We use information we have to develop, test, and improve our Products, including by conducting surveys and research, and testing and troubleshooting new products and features.
If you request a password reset, your IP address will be included in the reset email.
Provide measurement, analytics, and other business services.
We use the information we have (including your activity on and off our Products, such as the websites you visit or features you see) to help partners measure the effectiveness and distribution of services and understand the type of people who use these services and how people interact with their websites, apps, and services- to ensure participants with the best measures possible for academic resilience and supports.
Promote safety, integrity, and security.
We use the information we have to verify accounts and activity, combat harmful conduct, detect and prevent spam and other bad experiences, maintain the integrity of our Products, and promote safety and security on and off of Peeramid Products. For example, we use data we have to investigate suspicious activity or violations of our terms or policies, or to detect when someone needs help. To learn more, visit the Peeramid Security Help Center and Peeramid Security Tips.
Communicate with you.
We use the information we have to communicate with you about our Products, and let you know about our policies and terms. We also use your information to respond to you when you contact us.
Research and innovate for social and wellness good.
We use the information we have (including research from our partners we collaborate with) to conduct and support research and innovation on topics of general social welfare, public interest, health and well-being. For example, we analyze information we have about wellness patterns during a crisis to aid relief efforts. Learn more about our research programs.
Law enforcement or legal requests.
We share information with law enforcement or in response to legal requests in the circumstances outlined below.
In general, the Personal Information you provide to us is used to help us communicate with you. For example, we use Personal Information to contact users in response to questions, solicit feedback from users, provide technical support, and inform users about resources available.
We may share Personal Information with outside parties if we have a good-faith belief that access, use, preservation or disclosure of the information is reasonably necessary to meet any applicable legal process or enforceable governmental request; to enforce applicable Terms of Service, including investigation of potential violations; address fraud, security or technical concerns; or to protect against harm to the rights, property, or safety of our users or the public as required or permitted by law.
Service providers provide services to us that help us provide our Products to you. We share the information we have about you to receive these services, which include:
- Investigating suspicious activity
- Detecting and stopping threats to our Personnel and Property
- Improving the functionality of our Products
- Conducting research and surveys
- Marketing and promoting our Products
How do we respond to legal requests or prevent harm?
We access, preserve and share your information with regulators, law enforcement or others:
- In response to a legal request (like a search warrant, court order or subpoena) if we have a good faith belief that the law requires us to do so. This may include responding to legal requests from jurisdictions outside of the United States when we have a good-faith belief that the response is required by law in that jurisdiction, affects users in that jurisdiction, and is consistent with internationally recognized standards.
- When we have a good-faith belief it is necessary to: detect, prevent and address fraud, unauthorized use of the Products, violations of our terms or policies, or other harmful or illegal activity; to protect ourselves (including our rights, property or Products), you or others, including as part of investigations or regulatory inquiries; or to prevent death or imminent bodily harm. For example, if relevant, we provide information to and receive information from third-party partners about the reliability of your account to prevent fraud, abuse and other harmful activity on and off our Products.
Information we receive about you (including financial transaction data related to purchases made on our Products) can be accessed and preserved for an extended period when it is the subject of a legal request or obligation, governmental investigation, or investigations of possible violations of our terms or policies, or otherwise to prevent harm. We also retain information from accounts disabled for terms violations for at least a year to prevent repeat abuse or other term violations
How long do we retain your data?
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
III. HOW WE PROTECT INFORMATION
We implement security measures, including but not limited to HIPAA and FERPA compliances, designed to protect your information from unauthorized access. Your account is protected by your account password and we urge you to take steps to keep your personal information safe by not disclosing your password and by logging out of your account after each use. We further protect your information from potential security breaches by implementing certain technological security measures including encryption, firewalls and secure socket layer technology. However, these measures do not guarantee that your information will not be accessed, disclosed, altered or destroyed by breach of such firewalls and secure server software. By using our Service, you acknowledge that you understand and agree to assume these risks.
IV. YOUR RIGHTS REGARDING THE USE OF YOUR PERSONAL INFORMATION
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
V. LINKS TO OTHER WEBSITES
Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
We encourage our users to read the privacy statements of other websites before proceeding to use them.
VII. CONTACT US
We care deeply about the safety of the people who use our apps. We regularly consult with experts in suicide and self-injury to help inform our policies and enforcement, and work with organizations around the world to provide assistance to people in distress.
While we do not allow people to intentionally or unintentionally celebrate or promote suicide or self-injury, we do allow people to discuss these topics because we want Facebook to be a space where people can share their experiences, raise awareness about these issues, and seek support from one another.
We define self-injury as the intentional and direct injuring of the body, including self-mutilation and eating disorders. We remove any content that encourages suicide or self-injury, including fictional content such as memes or illustrations and any self-injury content which is graphic, regardless of context. We also remove content that identifies and negatively targets victims or survivors of suicide or self-injury seriously, humorously or rhetorically, as well as real time depictions of suicide or self-injury. Content about recovery of suicide or self-harm that is allowed, but may contain imagery that could be upsetting, such as a healed scar, is placed behind a sensitivity screen.
When people post or search for suicide or self-injury- related content, we will direct them to local organizations that can provide support and if our Community Operations team is concerned about immediate harm we will contact local emergency services to get them help. For more information, visit the Peeramid Safety Center.
With respect to live content, experts have told us that if someone is saying they intend to attempt suicide on a livestream, we should leave the content up for as long as possible, because the longer someone is talking to a camera, the more opportunity there is for a friend or family member to call emergency services.
However, to minimize the risk of others being negatively impacted by viewing this content, we will stop the livestream at the point at which the threat turns into an attempt. As mentioned above, in any case, we will contact emergency services if we identify someone is at immediate risk of harming themselves.
Do not post:
Content that promotes, encourages, coordinates, or provides instructions for
- Eating disorders.
Content that depicts graphic self-injury imagery
It is against our policies to post content depicting a person who engaged in a suicide attempt or death by suicide
Content that focuses on depiction of ribs, collar bones, thigh gaps, hips, concave stomach, or protruding spine or scapula when shared together with terms associated with eating disorders
Content that contains instructions for drastic and unhealthy weight loss when shared together with terms associated with eating disorders.
Content that mocks victims or survivors of suicide, self-injury or eating disorders who are either publicly known or implied to have experienced suicide or self-injury.
For the following content, we restrict content to adults over the age of 18, and include a sensitivity screen so that people are aware the content may be upsetting:
- Photos or videos depicting a person who engaged in euthanasia/assisted suicide in a medical setting.
For the following content, we include a sensitivity screen so that people are aware the content may be upsetting to some:
- Content that depicts older instances of self-harm such as healed cuts or other non-graphic self-injury imagery in a self-injury, suicide or recovery context.
- Content that depicts ribs, collar bones, thigh gaps, hips, concave stomach, or protruding spine or scapula in a recovery context.
We provide resources to people who post written or verbal admissions of engagement in self injury, including:
- Euthanasia/assisted suicide.
- Eating disorders.
- Vague, potentially suicidal statements or references (including memes or stock imagery about sad mood or depression) in a suicide or self-injury context.
For the following Community Standards, we require additional information and/or context to enforce:
- We may remove suicide notes when we have confirmation of a suicide or suicide attempt. We try to identify suicide notes using several factors, including but not limited to, family or legal representative requests, media reports, law enforcement reports or other third party sources (e.g. government agencies, NGOs).
A suicide note may also be removed when reported through the Suicidal Content Contract Form or Peeramid Contact Form when we have confirmation of a suicide or suicide attempt.