Samsung GT P5210ZWYXAR Tablet User Manual


 
197
If you choose to participate in those promotions, we may
share your information with the sponsor if they need it to
send you a product or other special promotion they offer.
Third Party Advertisers
We may use third-party advertising companies to deliver
specific advertisements to you. These companies may collect
non-personal information about your visits to Social Hub in
order to provide advertisements about products and services
that may be of interest to you.
These companies may also aggregate your non-personal
information for use in targeted advertising, marketing
research, and other similar purposes. These companies may
place their own cookies on your computer. If you want to
prevent a third-party advertiser from collecting and using this
information, you may visit each third party advertiser's
website directly and opt-out.
Other Disclosures
We may disclose personal information when we are required
or requested to do so by law, court order or other
government or law enforcement authority or regulatory
agency; to enforce or apply our rights and agreements; or
when we believe in good faith that disclosing this information
is necessary or advisable, including, for example, to protect
the rights, property, or safety of the Service and Samsung,
our users, or others.
CHILDREN
The Service is not designed for use by children without their
parent's supervision. We ask that anyone under the age of
sixteen (16) not submit any personal information through the
Service. We do not knowingly collect any personal
information from children under the age of eighteen, and
therefore we do not knowingly distribute such information to
third parties.
SECURITY OF THE INFORMATION WE
COLLECT
The security of your personal information is important to us.
We maintain physical, electronic, and procedural safeguards
to secure your personal information. However, there is
always some risk in transmitting information electronically.
The personal information we collect is stored within
databases that we control.
As we deem appropriate, we use security measures
consistent with industry standards, such as firewalls and
encryption technology, to protect your information. However,