ZELLE NETWORK® COOKIES & TRACKING TECHNOLOGIES POLICY
- Cookies and Other Tracking Technologies & How We Use Them
- Your Cookie Choices & How to Opt-Out
- Information Collected and Cookies and Tracking Technologies Used On Zelle Site
- Social Media
- Contact Us
We use both session and persistent tracking technologies. Tracking technologies (e.g., cookies) can either be persistent (i.e., they remain on your computer until you delete them) or temporary (i.e., they last only until you close your browser).
We also use first and third-party cookies. First party cookies are used and controlled by us to provide services on the Site. Third-party cookies are controlled by third-parties, mostly for the purpose of analytics.
In particular, our Site uses the following categories of cookies:
Most browsers are initially set up to accept HTTP Cookies. The “help” feature of the menu bar on most browsers will tell you how to stop accepting new cookies, how to receive notification of new cookies and how to disable existing cookies. For more information about HTTP cookies and how to disable them, you can consult the information at http://www.networkadvertising.org/choices/ and www.allaboutcookies.org/manage-cookies/.
We are not responsible for the effectiveness of any such opt-out options. California residents may be entitled to know the effects of opt-out options under California Business & Professions Code Section 22575(b)(7). The effect of an opt-out, if successful, will be to stop targeted advertising, but it will still allow the collection of usage data for certain purposes (e.g., research, analytics and internal Site operation purposes).
Controlling the HTML5 local storage on your browser depends on which browser you use. For more information regarding your specific browser please consult the browser’s website (often in the Help section).
Please note, however, that without HTTP cookies and HTML5 local storage, you may not be able to take full advantage of all our Site features and some parts of the Site may not function properly.
The following list sets out the information collected via the individual cookies and tracking technologies we use.
We provide the information below as a courtesy for all users, but we are not obligated to maintain or update it.
For More Information
User of Tracking Technologies
Google Tag Manager
Tag definition and managment
About AddToAny (formerly Lockerz Share)
Social bookmarking widget
DoubleClick & DoubleClick Floodlight
Marketing and email analytics
We also use social plugins on our Site. The social plugins used on the Site are hosted by a social media networks such as Facebook or Google+ or others and your browser therefore sends this cookie data to that social media network when loading the social plugin inside your browser. These data contain information on your use of the Site. In case you are registered with the social media network, the data will be associated with your data already stored in the social media network. We use a two-click-mechanism for social plugins. Prior to using the social plugin, you must activate it by clicking the social plugin. Until the social plugin is activated, some cookies will not collect your data and they will not be sent to the social media network.
Cookies: A cookie (sometimes referred to as local storage object or LSO) is a data file placed on a device. Cookies can be created through a variety of web-related protocols and technologies, such as HTTP (sometimes referred to as “browser cookies”), and HTML5. For more information on third party cookies that we use for analytics, please review the table in Section 3 of this Cookies and Tracking Technologies Policy.
Web Beacons: Small graphic images or other web programming code called web beacons (also known as “1×1 GIFs” or “clear GIFs”) may be included in our Site’s pages and messages. Web beacons may be invisible to you, but any electronic image or other web programming code inserted into a page or email can act as a web beacon.
Clear GIFs are tiny graphics with a unique identifier, similar in function to cookies. In contrast to HTTP cookies, which are stored on a user's computer hard drive, clear GIFs are embedded invisibly on web pages and are about the size of the period at the end of this sentence.
Unique Device ID (UDID)Tokens: The unique series of numbers and letters assigned to your device.
Unique Device Tokens: For each user that accepts push notifications in mobile apps, the app developer is provided with a unique device token (think of it as an address) from the app platform (e.g., Apple and Google).
Deterministic Finger-printing technologies: If a user can be positively identified across multiple devices, for instance, because the user has logged into a platform such as Google, Facebook, Yahoo or Twitter, it can be “determined” who the user is for purposes of improving customer service.
Probabilistic Finger-printing: Probabilistic tracking depends upon collecting non-personal data regarding device attributes like operating system, device make and model, IP addresses, ad requests and location data, and making statistical inferences to link multiple devices to a single user. Note that this is accomplished through proprietary algorithms owned by the companies performing probabilistic finger-printing. Note also that in the EU IP Addresses are personal information.
Device Graph: Device graphs can be created by combining non-personal data regarding use of smartphones and other devices with personal log-in information to track interactions with content across multiple devices.
Unique Identifier Header (UIDH): Unique Identifier Header (UIDH) is the address information that accompanies Internet (http) requests transmitted over an ISP’s wireless network. For example, when a customer types on his or her phone the web address of a retailer that request travels over the network and is delivered to the retailer's website. The information included in that request includes things like the device type and screen size so that the retailer site knows how to best display the site on the phone. The UIDH is included in this information, and can be used as an anonymous way for advertisers to be able to determine that the user is part of a group that a third party advertiser is attempting to reach.
It is important to note that the UIDH is a temporary, anonymous identifier included with unencrypted web traffic. We change the UIDH on a regular basis to protect the privacy of our customers. We do not use the UIDH to collect web browsing information and it does not broadcast individuals' web browsing activity out to advertisers or others.
Embedded Scripts. An embedded script is programming code that is designed to collect information about your interactions with the Site, such as the links you click on. The code is temporarily downloaded onto your device from our web server or a third-party service provider, is active only while you are connected to the Site, and is deactivated or deleted thereafter.
ETag, or entity tag. A feature of the cache in browsers, an ETag is an opaque identifier assigned by a web server to a specific version of a resource found at a URL. If the resource content at that URL ever changes, a new and different ETag is assigned. Used in this manner ETags are a form of device identifier. ETag tracking may generate unique tracking values even where the consumer blocks HTTP, Flash, and/or HTML5 cookies.
For any queries in relation to this Cookies and Tracking Technologies Policy please contact us at email@example.com or Early Warning Services, LLC, Attn: Privacy Office, 16552 N. 90th Street, Scottsdale, AZ 85260.