Privacy Policy

Effective Date:  February 16, 2018

This Privacy Statement applies to information that Compromised, LLC, on behalf of itself and its corporate affiliates (collectively “Compromised,” “we” or “us”) collects on and other websites, applications, and digital services (collectively, the “Site”) on or to which this Privacy Statement is linked or referenced (collectively, the “Services”).

Your privacy is important to us. This Compromised Privacy Statement (“Privacy Statement”) describes the information we collect, why we collect it, and what we do with the information we collect from or about you and/or your company and/or other business (“you”) through the Services. This Privacy Statement does not apply to third-party websites and other digital services linked to the Services or information collected from you off line. 

The Services are intended for U.S. residents.  You are not authorized to access and use the Services if you are located outside the U.S. 

This Privacy Statement is incorporated into and made a part of the Compromised Website Terms of Use (“Terms of Use”) and the customer Terms of Service (“Terms of Service”).  You agree that you have reviewed our Terms of Use and Terms of Service for additional, important privacy information.

If you do not agree with any part of this Privacy Statement, our Terms of Use, or, if applicable, our Terms of Service, then please do not use

How We Define Collected Information
For purposes of this Privacy Statement, “Collected Information” means any information that you submit to Compromised to or though the Services.  For example, Collected Information includes (but is not necessarily limited to) personal information, financial and billing information, approved information provided by company to perform services, and additional information about you and/or your company’s approved Users of Compromised. Collected Information also includes information that does not directly identify you or your company but when combined with other information identifies (or can be used to identify) you and/or your company. 

How We Collect and Use Collected Information 
How we collect and use information from you depends on how and why you use the Services. Compromised collects information in the following ways:

When You Give Compromised Information: When expressing an interest in obtaining information about the Services, or registering to use or using the websites or other Services, Compromised requires you to provide personal contact information, such as name, company name, address, phone number, and email address. When purchasing or using Services, Compromised may also require you to provide Compromised with financial qualification and billing information, such as billing name and address, credit card number, and additional information. Compromised may also ask you to provide demographic and additional information about you and/or your company. These types of information, and any other information you submit to Compromised to or through the Services, are referred to collectively as “Collected Information.”

In addition, if you sign up for emails about Compromised’s latest news and new products, we collect the email address that you give us. We also collect feedback, questions, and information that you provide to us for customer support.

When You Use the Services: We collect information about how and when you use the Services:

Through Server Logs: A server log is a list of the activities that a server performs. Compromised’s servers automatically collect and store in server logs, your search queries, Internet Protocol (IP) address, the date and time of your request and referral URL, and certain cookies that identify your browser or Compromised account. 

From Your Computer, Tablet or Mobile Telephone: We may collect information about your computer, tablet or mobile telephone (“Device”), such as model, operating system version, mobile network information, telephone number, pass codes, internet service provider and similar identifiers. We may associate your Device information with your account. We may collect and store information (including Collected Information) on your Device through browser web storage (including HTML 5) and web application data caches.

We may collect data about the location of the Device that you use to access the Services (“Location Data”) using IP address, GPS, cellular towers and other information from your mobile service provider, Bluetooth address, Wi-Fi access points and information made available by you or others that indicates the current or prior location of the user, such as geotag information in photographs. How we collect Location Data depends on how you access the Services. Certain Services may collect Location Data even when you are not actively using the Services. If you do not want us to collect Location Data from your mobile Device, please turn off the location services in your Device settings.

Through Cookies and Similar Tools: We use cookies, pixel tabs (also known as web beacons, flash cookies and clear GIFs) and similar technology to automatically collect information about you when you use the Services. Please read the “How We Use Data Collection Tools” section (below) to learn more about how Compromised uses these tools.

From Other Sources: Compromised collects information about you from third parties:

When you Connect with Social Media through the Services: The Services link to social media platforms through “plug-ins” (e.g., Twitter and LinkedIn buttons). If you are logged into your social media account and access the Services, we may (depending on your settings) automatically receive information (including Collected Information) from the social media platform.  Compromised collects and uses this information for the purposes described in this Privacy Statement or at the time the information is collected. Please remember that the manner in which a social media platform uses, stores and discloses your information is governed by the terms and policies applicable to your use of such platforms, and Compromised has no liability or responsibility for the privacy practices or other actions of any social media platform with which you connect through the App or Services.

From Third Parties: Compromised may from time to time supplement the information that we collect from you with information from third parties. We may combine the third-party information with information that we already have from or about you.

Through Service Providers: Third parties that assist us with our business operations also collect and use information (including Collected Information) through the Services and also may share the collected information with us. For example, our service providers collect and share information with us to analyze the performance of the Services and detect and prevent fraud.

Compromised uses your Collected Information as described in this Privacy Statement and for any other purpose that we disclose when we collect your Collected Information

Compromised uses Collected Information to:

How We Use Data Collection Tools
Cookies, pixel tabs (also known as web beacons, flash cookies and clear GIFs) and similar technology (“Data Collection Tools”) help Compromised automatically collect information about you when you use the Services.

Web Beacons: A web beacon (also called a pixel tag or clear GIF) is computer code that communicates information from your device to a server. Some of our content and emails may contain embedded web beacons that allow a server to read certain types of information from your Device, allow us to count the number of people who have viewed content, to know when you opened an email message, and the IP address of your Device. Web beacons help us develop statistical information to provide better and more personalized content.

Cookies: Cookies are small text files that are sent to or accessed from your web browser or your computer’s hard drive. A cookie typically contains the name of the domain (internet location) from which the cookie originated, the “lifetime” of the cookie (i.e., when it expires), and a randomly generated unique number or similar identifier. A cookie also may contain information about your Device, such as user settings, browsing history, and activities conducted while using the Services.  
Compromised uses the following types of cookies:

To learn more about cookies and web beacons, visit

Data Collection Tools record how long you spend on various webpages, which webpages you view, your search queries, the products you viewed, error and performance reports, your IP address, your browser type, time zone and language settings and operating system.  Data Collection Tools also help us with fraud prevention and detection.

Compromised also may use analytics services, such as Google Analytics, to collect information.  Generally, analytics services do not identify individual users.  Many analytics services allow you to opt out of data collection.  For example, to learn more about Google Analytics practices and to opt out, visit or download the Google Analytics opt-out browser add-on at 

Your Control of Data Collection Technology: Some web and mobile browsers provide settings that allow you to control or reject cookies or to alert you when a cookie is stored in your browser. If you set your browser to refuse to accept cookies, you may not be able to use certain features of the Services or access some of our online services. You also may be able to reject use of mobile device identifiers by activating the appropriate setting on your Device. Although you are not required to accept cookies or mobile device identifiers, if you block or reject them, you may not have access to all features available through the Services.

How We Respond to Do Not Track Signals
Some web browsers (including Safari, Internet Explorer, Firefox, and Chrome) incorporate a “Do Not Track” (“DNT”) or similar feature that signals to a website that a user does not want to have his or her online activity and behavior tracked.  If a website that responds to a particular DNT signal receives the DNT signal, the browser can block that website from collecting certain information about the browser’s user.  Not all browsers offer a DNT option and DNT signals are not yet uniform.  For this reason, many website operators, including Compromised, do not respond to DNT signals. Compromised is able to offer and provide you with our Services whether or not your browser incorporates DNT signals.

How We Share Collected Information 
We may share Collected Information collected through the Services as follows.

Affiliates: Compromised shares Collected Information within Compromised’s corporate family for the purposes described in this Privacy Statement and as required by law.

Service Providers: Compromised shares information with Compromised’s third-party service providers that help us operate the Services, provide Compromised products, and personalize your experience on the Services. For example, some service providers help us with payment card processing, sending emails, order fulfillment, conducting advertising, providing customer service or product support, industry benchmarking, consumer analysis, market research, and administering promotions.

Corporate Transactions: Compromised may share and transfer Collected Information if Compromised is involved in a merger, sale, acquisition, divestiture, restructuring, reorganization, dissolution, bankruptcy, or other change of ownership or control by Compromised or any affiliated company (in each case, whether in whole or in part).

Other Lawful Disclosures: Compromised also shares information: (i) as permitted by law; (ii) if we determine that disclosure of specific information is necessary to comply with the request of a law enforcement or regulatory agency or other legal process; (iii) to protect the rights, privacy, property, interests, or safety of our company or our affiliates, customers, business partners, employees, or the general public; (iv) to pursue available remedies or limit the damages; (v) to enforce the Terms of Use and Terms of Service; and (vi) to respond to an emergency.

Compromised never publicly discloses any Collected Information related to financial or payment activities or any government identification numbers. Compromised also doesn't allow unauthorized publishing or disclosure of any user’s non-public contacts.

How We Protect and Store Information
Compromised takes precautions intended to help protect information that we collect and store; however, any transmission to us is at your own risk, and we expect that you will use appropriate security measures to protect your information.

You are responsible for maintaining the security of your account credentials and other authentication involved in obtaining access to password-protected or secure areas of the Services.  Compromised will treat access to the Services through your account credentials as authorized by you.  Unauthorized access to password-protected or secure areas is prohibited and may lead to criminal prosecution.  We may suspend your use of all or part of the Services without notice if we suspect or detect any breach of security.  If you believe that information you provided to us is no longer secure, please notify us immediately using the contact information provided below.

We retain information for as long as necessary to fulfill the purposes for which you provided the information, to comply with legal obligations, to resolve disputes, to enforce agreements, and similar essential purposes.

Linking to Other Sites
Compromised may provide links to websites operated by unrelated third parties, such as companies that provide services for us or in which we think you may have an interest.  Please note that when you navigate to the website of an unrelated third party, this Privacy Statement no longer applies.  We encourage you to read the privacy policies of every website or service that you visit to understand how your Collected Information is processed.

This Privacy Policy does not apply to any Collected Information collected by Compromised other than Collected Information collected through the Services. This Privacy Policy shall not apply to any unsolicited information you provide to Compromised through the Services or through any other means. This includes, but is not limited to, information posted to any public areas of the Services, such as forums, any ideas for new products or modifications to existing products, and other unsolicited submissions (collectively, “Unsolicited Information”). All Unsolicited Information shall be deemed to be non-confidential and Compromised shall be free to reproduce, use, disclose, and distribute such Unsolicited Information to others without limitation or attribution.

How Can I Correct or Delete My Collected Information? 
If you would like to correct or delete Collected Information, please send us an e-mail with your request to  Compromised reserves the right to request that you provide information that will enable Compromised to confirm that you have the authority to correct or delete the Collected Information that you want corrected or deleted. Compromised will use reasonable efforts to correct your Collected Information but does not be have the ability to correct or delete Collected Information shared by third parties.

Your Opt Out Rights

Unsubscribe from Our E-mails: If you do not wish to receive promotional e-mails from us, (whether on our behalf or on behalf of a third party), including our e-newsletters, follow the unsubscribe process at the bottom of the promotional e-mail. Note that even if you opt out, you may still receive transactional e-mails from us (e.g., e-mails related to the completion of your registration, correction of user data, password reset requests, reminder e-mails that you have requested, and any other similar communications essential to your transactions on or made through the services).

If you have any problems or questions regarding your privacy preferences or opt out options, you may reach us during regular business hours at

Children’s Privacy
The Services are not directed to or intended for use by minors. Consistent with the requirements of the U.S. Children’s Online Privacy Protection Act, if we learn that we have received any information directly from a child under age 13 without his or her parent’s verified consent, we will use that information only to respond directly to that child (or his or her parent or legal guardian) to inform the child that he or she cannot use the Services and subsequently will delete that information.

Notice to California Residents
California Civil Code Section 1798.83 permits individual California residents to opt-out of Compromised’s disclosure of Collected Information to third parties for their direct marketing purposes. Compromised currently does not disclose Collected Information to third parties for their direct marketing purposes.

Changes to this Privacy Statement
The Effective Date of this Privacy Statement is set forth at the top of this webpage. We reserve the right to change this Privacy Statement as business needs require. If we make material changes to the way we use Collected Information, we will post a notice about the changes prominently on the Services in advance so that you have an opportunity to discontinue your use of the Services. Your continued use of the Services after the Effective Date constitutes your acceptance of the amended Privacy Statement. The amended Privacy Statement supersedes all previous versions.

How to Contact Us
If at any time you have questions about the Compromised Privacy Statement, please contact us at or by mail to Compromised at 495 Mansfield Avenue Pittsburgh PA 15205.

© 2018 Compromised