Privacy Policy

This privacy policy applies to all of the products, services and websites offered by Social Exploits or its subsidiaries or affiliated companies, hereafter collectively referred to as Social Exploits. Sometimes, we may post site, service, and/or product specific privacy notices or additional materials to explain our products in more detail.

If you have any questions about this privacy policy, please feel free to contact us through our website or write to us at

Privacy Support
c/o Social Exploits
4607 Lakeview Canyon Road #242
Westlake Village, CA, 91361

Table of contents

Information we collect, and how we use it

  • Information you provide: When you sign up for an account with a service, site, and or product offered by Social Exploits, we ask you for personal information. We may combine the information you submit with information from other Social Exploits services or third parties in order to provide you with a better experience and to improve the quality of our services. For certain services, we may give you the opportunity to opt out of combining such information.
  • Cookies: When you visit Social Exploits, we send one or more cookies to your computer or other device. We use cookies to improve the quality of our service, including for storing user preferences, improving search results and ad selection, and tracking user trends, such as how people search. Social Exploits also uses cookies in its advertising services to help serve and manage ads on the Social Exploits services.
  • Web beacons: Web beacons are small bits of code embedded in Web pages or in emails. Web beacons may be used to deliver or communicate with cookies, to count users who have visited a Web page and to understand usage patterns. Web beacons also may be included in emails to learn if messages have been opened, acted on or forwarded. You can disable the ability of Web beacons to capture information in this manner by blocking cookies.
  • Log files: When you access Social Exploits services via a browser, application or other client our servers automatically record certain information. These server logs may include information such as your web request, your interaction with a service, Internet Protocol address, browser type, browser language, the date and time of your request and one or more cookies that may uniquely identify your browser, your account, or you.
  • User communication: When you send email or other communications to Social Exploits, we may retain those communications in order to process your inquiries, respond to your requests and improve our services. We may use your email address to communicate with you about our services.
  • Affiliated services on other sites: We offer some of our services on or through other web sites. Personal information that you provide to those sites may be sent to Social Exploits in order to deliver the service. We process such information under this privacy policy.
  • Third party applications: Social Exploits may make available third party applications through its services. The information collected by Social Exploits when you enable and/or use a third party application is processed under this privacy policy. Information collected by the third party application provider is governed by their privacy policies.
  • Unique identifiers: Certain services include a unique application identifier, separate from cookies and/or web beacons, and that is not associated with your account or you. This number and information about your installation (e.g., operating system type, version number) may be sent to Social Exploits when you install or uninstall that service or when that service periodically contacts our servers (for example, to request automatic updates to the software).

Social Exploits contains links to other sites that are not owned or controlled by Social Exploits. Please be aware that Social Exploits is not responsible for the privacy practices of such other sites. We encourage you to be aware when you leave our site and to read the privacy statements of each and every web site that collects personally identifiable information.

Your choices

We want to keep your name and email address accurate. You can correct or update your name or email address that you have provided us. You may contact us through our contact form or at the address above to request such change.

The Site may allow you to choose to receive or stop receiving communications from us. You can prevent further use of your name or email address by contacting us through our contact form or at the address above.

Information disclosure
We will not voluntarily share your name and email provided via the Site to any third party, except:

  • With third parties that we hire to perform services for us (these third parties are not authorized to keep or use your personal information for any other purpose),
  • To comply with legal requirements, such as law, regulation, warrant, subpoena, court order, or with a regulator or law enforcement agency or personnel or
  • In connection with a corporate sale, merger, reorganization, acquisition, dissolution or similar event.

Visitor information described above under “Information that we collect and how we use it” may be provided to third parties as described under “Cookies“ and “Web Beacons.”

Children’s Online Privacy Protection Act (COPPA)

The Site is not intended for use by children under the age of 13. We will not knowingly collect personal information from them. If we discover that a child has provided us with personal information, we will use reasonable efforts to delete this information. If you have reason to believe we may have accidentally received personal information from a child under the age of 13, please immediately contact us through our contact form or at the address above.

Information security

We take appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data. These include internal reviews of our data collection, storage and processing practices and security measures, including appropriate encryption and physical security measures to guard against unauthorized access to systems where we store personal data.

We restrict access to personal information to Social Exploits employees, contractors and agents who need to know that information in order to process it on our behalf. These individuals are bound by confidentiality obligations and may be subject to discipline, including termination and criminal prosecution, if they fail to meet these obligations.

Social Exploits does not store credit card numbers on our servers. Credit card numbers are submitted to a credit card authorization service. This service provides Social Exploits with credit card validation information only. We do not have access to your personal financial data.
Social Exploits may employ independent contractors to help manage data services, and such contractors may have access to data, similar to the access we give our employees. Also, Social Exploits may store sales account data, including personally identifiable information, with a third party application service provider.

Changes to this privacy policy

We reserve the right to modify this privacy statement at any time, so please review it frequently. If we decide to change our privacy policy, we will post those changes to this privacy statement in places we deem appropriate so that you are aware of what information we collect, how we use it, and under what circumstances, if any, we disclose it.