Copyrights and Limited License.
All words, pictures, content, graphs, charts and other matters presented or made available on the Website sourced from Us are Copyright 2010-2018 Figure 53, LLC (the "Information"). Content provided by Our Customers is copyrighted as provided in their content. We grant You a limited, royalty free, non-exclusive, revocable license to make use of the Information for Your own personal or internal business purposes only. All other rights are expressly reserved. Our Customers who use the Website to display content may have other terms and conditions with respect to use of their content, which may be linked inside of their content or otherwise provided to you.
No License to Trademarks.
All trademarks, service marks, tradenames or other identifying marks displayed on the Website (the "Marks") are owned by Us and/or Our licensors, or by our Customers. Except as applicable law may otherwise provide, or except as provided in writing by our Customers (with respect to their Marks) or agreed to in writing by Us, neither We nor our Customers consent to any use of the Marks by any person and do not grant You any right to use the Marks displayed on this Website.
Access By Minors.
We cannot prohibit minors from visiting this site. We must rely on parents, guardians and those responsible for supervising children under 13 to decide which materials are appropriate for such children to view and/or purchase. Pursuant to 47 U.S.C. Section 230 (d), as amended, We hereby notify You that parental control protections (such as computer hardware, software or filtering services) are commercially available that may assist you in limiting access to material that is harmful to minors. Information identifying current providers of such protections is available on the two websites GetNetWise and OnGuard Online. Please note that We do not endorse any of the products or services listed at such websites.
Misuse of the Website.
We do not validate, error check or otherwise confirm the truth or accuracy of Information posted on the Website; or review, edit, censor or warrant the quality or accuracy of Information that You may acquire from the Website. You agree not to sue or make any claim of any kind against Us regarding Information posted or available on the Website. When We become aware of harmful activities or if we receive any claim from a third party, in our sole and unfettered discretion We may take steps to stop the activity, such as removing the offending materials, denying the offender access to the Website or any other action We deem appropriate. We are required to remove or block access to content or postings upon receipt of a proper notice of copyright infringement. All remedies are non-exclusive. We are not responsible for (and You agree not to sue us in respect of) Information posted by our Customers.
To the extent Information on the Website includes advertising, promotions or other sales related data, We are not responsible for errors in such Information, and such Information does not and is not an offer to enter into a contract, but rather, is merely a solicitation to receive offers from You.
Disclaimers as to Information.
WE AND OUR CUSTOMERS MAKE NO REPRESENTATIONS OR WARRANTIES ABOUT THE SUITABILITY OF THE INFORMATION FOR ANY PURPOSE. THE WEBSITE AND ALL INFORMATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND AND ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE WEBSITE AND/OR THE INFORMATION, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, ACCURACY, TITLE AND NON-INFRINGEMENT, ARE SPECIFICALLY DISCLAIMED. IN NO EVENT SHALL WE AND/OR OUR CONTRIBUTORS BE LIABLE FOR ANY SPECIAL, INDIRECT, PUNITIVE OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE INFORMATION OR THE WEBSITE. THERE IS NO WARRANTY THAT ANY INFORMATION, WEBSITE, CONTENT, COMPUTER PROGRAM OR ANY EFFORTS PROVIDED BY US WILL FULFILL ANY OF YOUR PARTICULAR PURPOSES OR NEEDS. YOUR SOLE REMEDY IN THE EVENT YOU HAVE ANY CLAIM AGAINST US IN RESPECT OF THE WEBSITE OR THE INFORMATION IS FOR US TO REPAIR, REPLACE OR OTHERWISE CORRECT THE INFORMATION.
We do not consent to "framing" our content or Information inside of any other page.
Governing Law; Choice of Forum.
Last updated: November 13, 2018
GENERAL NON-DISCLOSURE POLICY: WE DO NOT DISCLOSE OR SHARE YOUR PERSONALLY IDENTIFIABLE INFORMATION TO ANY THIRD PARTY (EXCEPT SOLELY TO PROVIDE THE SERVICES TO YOU), WITHOUT YOUR OPT IN FOR SUCH DISCLOSURE. Please see the section entitled “HOW DO WE DISCLOSE AND USE YOUR INFORMATION?” below for complete details.
GENERAL NON-USE POLICY: WE DO NOT USE YOUR PERSONALLY IDENTIFIABLE INFORMATION EXCEPT SOLELY TO PROVIDE THE SERVICES TO YOU WITHOUT YOUR OPT IN FOR SUCH OTHER USES. Please see the section entitled “HOW DO WE DISCLOSE AND USE YOUR INFORMATION?” below for complete details.
What data do we collect?
Automated data collection
Our website and applications use standard web and software technologies to collect certain non-identifying information about your computer or device – which may include such information as your browser and computer/device type, your internet protocol address, the type of device you are using, and other information that your device sends to our website or application automatically. Our website and applications may also automatically set “cookies” — small files that contain information that allow the website or application to track certain information such as where you were referred from, which pages you have clicked on, and other analytical information about your use of the website or application. Collectively this information is referred to as “Automated Data.” We do not link or associate Automated Data we collect with your Personally Identifiable Information. We may use and disclose Automated Data in any manner we choose without restriction. You have some ability, by using browser plugins, ad blockers, or other third party tools, to block or prevent some collection of Automated Data, however, our website or applications may not function correctly if you do so. We make no guarantees of any kind that our website or applications will function correctly in any particular environment or with any plugins or other tools.
Manual data collection
When using our Services such as by ordering or registering, you may be asked to enter Personally Identifiable Information such as your email addresses, phone numbers, mobile device number, text message and/or social media contact information, physical mailing address, and other similar billing and communication information (“Contact Information”).
Third party data collection
We may also obtain information from third parties and we may combine that with Automated Data and/or Contact Information. For example, we may have access to certain information from a third-party social media service if you create or log into your online account through that service or otherwise provide us with access to information from that service. We will only access third party information in this manner consistent with the application program interface (API) provided by the third party and consistent with the settings you have used in allowing such use.
How do we disclose and use your information?
We may process, use and disclose the information we collect from or about you in the following ways:
- To process orders you make for our products or Services;
- To work with our service providers such as web hosting companies, internet service providers, data centers, programmers and other service providers we use to be able to make the website and applications available to you;
- To communicate with you about our products or Services or the products and services of third parties (however, please see below as to your rights to limit some of these communications);
- With your opt-in, to provide your Contact Information to third parties who may have products or services that we recommend or state are compatible with our products or Services. You have the right to limit or terminate this use of your Contact Information;
- To defend or bring any claim from/against you arising from our interactions;
- To meet a legal requirement (see below under “Compelled Disclosure”);
- To provide such information to our successor in a sale of our business or other change of control (see below under “Sale of Business”);
- To remove malware and viruses, and to remove content that violates our Acceptable Use Policy (see below under “Virus removal”);
We will comply with all applicable laws, rules and regulations, which may require that we disclose your information (including your Personally Identifiable Information) to government authorities, or to parties in court actions under subpoenas or court orders, or otherwise as we are advised we are required to do to comply with a legal obligation. We are a United States based company and subject to the laws of the United States, however, we may use servers and storage of data in locations in other parts of the world.
Sale of Business
We may, but are not responsible to, use a virus or malware scanner and scan data you have stored in any of our Services, and if our virus scanner detects malware, we reserve the right to remove it. Please note that a scan may mis-identify data as a virus, and so it is possible that portions of such data may not be available if our scanner takes this action. In addition, if we determine that you are storing, transmitting or otherwise enabling malware sites or software used in illegal hacking or attack efforts, or otherwise storing content that is harmful to computers or data, we reserve the right to suspend and/or terminate your account.
Right to limit some communications
Other access and use of data
Our mobile applications use the iOS-provided vendor identifier string which uniquely identifies a device only to us among our Apple App Store applications. (iOS no longer provides a globally identifiable UUID, and the App Store does not communicate any personally-identifiable transaction data to our applications.)
The Company’s QLab software licensing system creates a unique Machine ID which is used to associate a license seat activation with a specific computer. The Machine ID is stored in our online license account system and associated with a user account. Data from our Feedback Reporter (described below) submitted from our applications to our internal feedback system include these unique vendor identifier strings or Machine IDs only if the user opts to “Send Details” along with their feedback report.
The Company’s QLab software accesses the camera or microphone when a workspace uses the Camera or Microphone cue types, respectively. Starting in macOS 10.14 Mojave, macOS may require user-permission to access cameras and microphones. You may elect not to use the camera or microphone, however, the functions in QLab that depend on those features being enabled will not work. We do not use data from the camera or microphone for any purpose other than for QLab to function correctly, and no camera or microphone data is sent to us.
Our Feedback Reporter tool stores an email address in the Application Preferences that is used for auto-filling the address field on subsequent uses, however the user must manually input the address into the form the first time.
All of our applications store data on the physical device to permit that data to survive a reboot/restart, such as app preferences. QLab saves workspace data to a document on disk. Go Button saves its show data to an internal database, and any audio files imported into the app are stored inside the app bundle on disk.
A user can choose to share certain items, for example, to export a Go Button show document to iCloud Drive or Dropbox. We do not have access to a user’s personal accounts such as iCloud Drive or Dropbox account, however, the software does if such accounts are enabled on a device. For example, the iOS file sharing mechanism gives Go Button access to data from file providers like Dropbox or Google Drive that the user already has installed on the device, but the connection and permission to access each service is managed by iOS. We do not manage any of the connections to these providers directly or remotely.
The data you may store, how we protect your information, and limits on your data sharing rights
We will use reasonable commercial effort to keep your information secure in our systems, however, you acknowledge that no system is hacker proof and that despite our reasonable efforts, your information could be accessed by unauthorized persons. In this regard, we will use the efforts required by applicable laws, rules, regulations and orders that apply to the specific types of information we have. Notwithstanding the above, you agree that we will not be liable for any unauthorized access to or use of your data or information except solely to the extent we are expressly held to have violated applicable laws, rules, regulations or orders.
WE ARE NOT RESPONSIBLE FOR YOUR LOSS OR MISUSE OF YOUR CREDENTIALS TO THE SERVICES WE PROVIDE, AND WE DO NOT MONITOR OR LOG SUCH ACCESS NOR WILL WE GIVE YOU NOTICE OF ANY COMPROMISE OF YOUR DATA. If we do detect such compromise, or you violate our Acceptable Use Policy, we may immediately suspend Services to you and/or terminate your account.
Third-Party Privacy Policies and Services
Occasionally, at our discretion, we may include or offer third-party products or services on our website or applications. These third-party sites have separate and independent privacy policies. We have not reviewed or verified any data or privacy policies of such linked sites and take no responsibility or liability for the content and activities of these linked sites, or their products or services.
Flurry automatically collects usage metrics (like number of sessions per hour) and technical details about a user (like device models and operating system versions). We use this data, for example, to plan updates relative to the adoption of a new release of iOS or the popularity of specific device models, etc.
We also use Flurry to log certain app events to help us monitor usage of specific features within the mobile applications. We do not include any personally identifiable data in the event logging.
Our Mac and iOS applications also have an integrated Feedback Reporter that we develop in-house. Users can choose to send us a message directly from our applications using a “Contact Support” option. The user is also automatically prompted by the feedback tool to submit a crash report after the app detects a crash. This tool communicates directly with our servers. There is no third-party involved with these feedback reports. You should never send sensitive personal information via the Feedback Reporter.
A feedback report includes:
- any message text entered by the user
- user email address, if provided by the user
- the app name and version of the app submitting the report
- crash report (only when reporting a crash)
The user can optionally choose to include additional details with their report by selecting a “Send Details” option in the reporter. These details include:
- System profile: OS version, machine/device model, memory, CPU, and a machine/device ID. On macOS, the profile also includes the computer serial number.
- Installed license details, if any
- App preferences
- Console logs (optional, only included if the user selects an additional “Include Console Logs” option)
- On macOS, the user can specify additional documents to be attached to the report which are then uploaded to our servers when the report is submitted.
In the Feedback Report data, all Personally Identifiable Information submitted is optional — license information, email address, and any documents included with the report. Unique IDs on macOS are generated by our licensing system. The unique ID from iOS only identifies the app among the Company’s applications installed on that device.
We may use other data analytics companies in combination with or as a replacement of Flurry Analytics and Feedback Reporter. All such data collected by Google and if applicable such other tools is Automated Data hereunder.
COPPA (Children Online Privacy Protection Act)
Our website and application are for use of adults at least 13 years old. We do not specifically market to children under the age of 13 years old.
We may display personal testimonials of satisfied customers on our website in addition to other endorsements. If you provide us with an email or other communication regarding our Services or products, you automatically hereby consent to our use of all or a part of such email or other communication for marketing our goods and Services, provided that we use only your first name. We will not use your image or likeness without specific authorization from you. If you notify us in writing to cease such use, we will do so within a reasonable time of receipt of such request.
Rights Under Laws
You may have additional rights under applicable state law to access certain information; for example California residents may have rights under California Code Section 1798.83. We will comply with these laws to the extent applicable to us.
Communications Decency Act Notice
We hereby notify You that parental control protections (such as computer hardware, software, or filtering services) are commercially available that may assist You in limiting access to material that is not suitable to minors. You can discover some of the providers of such parental control technology by searching for "parental control software" using a major search engine, or by visiting https://www.consumer.ftc.gov/articles/0031-protecting-your-childs-privacy-online.
2443 Maryland Ave.
Baltimore, Maryland 21218
ACCEPTABLE USE OF SERVICES. You agree as follows in respect of the acceptable and unacceptable uses of the Services. You will not and agree not to:
- Use or attempt to use the Services for any illegal, abusive or unethical activities as determined by us in our sole discretion, which include by example and not limitation, bullying or harassing third parties, illegal stalking, transmission of or storage of pornographic material, invasion of privacy, defamation, infringement of another person's copyright, trade secret, patent, trademark or other intellectual property rights, hacking or cracking (gaining unauthorized use of a computer), distributing computer viruses or other malware, gambling, harassment of another or distribution of other harmful materials, code, programs or scripts, disclosing “insider trading” information, national secrets, or other information prohibited or restricted from disclosure.
- Send unsolicited bulk mail messages ("junk mail" or "spam"). This includes bulk-mailing of commercial advertising, information announcements, charitable solicitations and political solicitations. Such material may only be sent to those who have specifically requested it or as authorized by applicable law, provided that if you assert that your activities are authorized by applicable law, you shall provide an opinion of reputable counsel establishing a basis upon which your actions are taken. Malicious or threatening e-mail is also prohibited. Normally we will assume that you are in compliance with this provision, however, if an upstream provider blacklists our IP range or mail server as a result of activities we trace to you, we will presume that you are in violation of this provision.
- Breach any applicable data protection statute by, for example, sending or storing personal information (as defined in applicable data protection statutes) in an unencrypted form.
- Impersonate another person, falsify the source of TCP/IP packets, spoof any portion of an email or TCP/IP header, or misrepresent authorization to act on behalf of others or us. All messages and packets transmitted via the Service should correctly identify the sender and source; you may not alter the attribution of origin in electronic mail messages or posting.
- Undermine the security or integrity of computing systems or networks or gain unauthorized access or control over our computers or any other person's computers.
- Permit another person to use your resources or the Services to conduct any of the matters you are prohibited from doing.
- Distribute any files in any peer-to-peer or file sharing arrangement, where it is possible that in such file sharing process any of the Services may be used to distribute copyrighted materials to or from persons who are not authorized to receive, copy, distribute or use them.
- Take any action that would cause us to violate any terms of an upstream service provider's acceptable use policy.
- Engage in any activity disruptive or abusive towards our other customers or to Services operations, including and not limited to:
- Distribute or post any virus, worm, Trojan horse, or computer code intended to disrupt Services, destroy data, destroy or damage equipment or disrupt Services operations;
- Degrade or impair the operation of Services servers and facilities or the servers and facilities of other network hosts or users;
- Post messages or software programs that consume excessive CPU time or storage space;
- Use the Services for mining crypto currencies or for any data mining activities;
- Subvert, or assist others in subverting, the security or integrity of any of Services, facilities or equipment; and/or
- Place false, fraudulent, materially incomplete or misleading information on the Services.
The above list of acceptable and unacceptable uses of the Services is not intended to be exhaustive, but rather illustrative of the range of unacceptable uses. We have the right in our sole discretion to determine whether any particular conduct is an acceptable use of the Services. In cases where we determine you engaged in conduct that you reasonably believed did not violate this policy in good faith, we will endeavor to provide you electronic notice of our determination that such conduct is not an acceptable use, and provided you cease such conduct not later than 24 hours after such notice, you will not be considered to be in breach of this Acceptable Use Policy.