At Stinson Hunter, it’s our mission to provide users with news updates, interactive online experiences. We’re always working to make our services even better. One of the ways we do that is by analyzing information we collect and receive about users in order to figure out what they might be interested in. This helps us develop more engaging content and provide more effective advertising, which enables us to keep most of our services free.
Information We Collect and Receive
Log information. This is information we automatically collect and store it Information about how you access those websites, apps, and other services, your browser or operating system, your Internet Protocol (“IP”) address, and the website you visited before visiting our Services.
Device information. This is information we automatically collect and store about the device you use when you access our Services
The type of device you’re using (e.g., an iPhone);
Your Internet service provider.
Information from third-party sources. We may receive additional information about you that is publicly or commercially available and combine that with the information we have collected or received about you in other ways. Also, we receive information about you when you choose to connect with social networking services while using our Services
To provide effective advertising. Many of our Services are supported by advertising, and some of our Services provide advertising on our websites and apps, and on third-party websites and apps. We use the information we collect and receive to make the advertising we provide more effective
Our Commitment to Security
Although no one can guarantee the security of the information collected and received, we do employ a number of safeguards intended to mitigate the risk of unauthorized access or disclosure of this information. Examples of the types of safeguards we may provide (depending on the circumstances) include:
Storing the data you provide in controlled facilities;
Using HTTPS encryption when you authenticate (i.e., log into one of our Services), which helps prevent unauthorized access to your login credentials;
Cookies are packets of information sent to your web browser and then sent back by the browser each time it accesses the server that sent the cookie. Some cookies are removed when you close your browser session. These are the “Session Cookies”. Some last for longer periods and are called “Persistent Cookies”.
Our Service allows services who provide online advertising services (“Ad-Serving Providers”) to display to you and other users personalized content and advertisements on the Service and on other online sites and services.
The Ad-Serving Providers use their own cookies and other technologies, such as pixel tags to collect and use personal information for displaying personalized ads, by them and by additional providers, and to run, maintain, measure the effectiveness and develop their services.
A pixel tag (also known as “action tag” and “web beacon”) is a 1X1 pixels transparent object which is embedded in a web page to enable the display of optimized content and advertisements to end users.
At any time, you may unsubscribe from our mailing lists or newsletters by using the ‘unsubscribe’ option in our messages.
Aggregated and Analytical Information
We may use standard analytics tools. The privacy practices of these tools are subject to their own privacy policies and they may use their own cookies to provide their services (for further information about cookies, please see the ‘Cookies’ section in this policy).
We use Google Analytics. For further information about how Google uses your personal information, please refer to:www.google.com/policies/privacy/partners/.
Keeping Your Information Safe
We and our hosting services implement reasonable measures to secure your personal information, to minimize the risks of theft, damage, loss of information, or unauthorized access or use of information.
We make efforts to protect your privacy, but we cannot guarantee that the Service will be immune from any wrongdoings, malfunctions, unlawful interceptions or access, or other kinds of abuse and misuse.