I. The Information We Collect
We receive and store certain types of information whenever users visit the site. In addition to the information individuals provide explicitly on the website (An anonymous username, voluntary e-mail adress ), we may collect the name of the domain and host from which users access the Internet; the IP address of the computer used; the browser and operating system used; the date and time of access; and the Internet address of the website linking to Kogama.com (including any search terms used to find Kogama through a search engine such as Google).
You may play the games on Kogama.com without creating an account.
To use all functionalities on the Website you must create a Kogama account. Upon creation of a Kogama account, we ask you to choose a username - please be sure to pick one that doesn't include any personally identifiable information.
You will also be asked to provide an e-mail address. This is entirely voluntary, and if you choose to do so it will only be used to communicate news from the games on the Website.
Kogama allows users to communicate in a number of ways. Private chat and in-game messages are only stored long enough to ensure stable delivery and then deleted. Note: revealing personally identifiable information is against the Terms and conditions, and it should not occur. Any personally identifiable information revealed in online activities will be available to others who can access this content. We will delete personally identifiable information, if we are made aware of a breach of this rule.
II. Disclosing Your Personally Identifiable Information
We are not in the business of selling or collecting personally identifiable information, and we aim to delete any info that has been given to us in violation of the terms and conditions; however, we may disclose information to third parties in the following circumstances:
- We may disclose information to others who provide services to us in order to operate, maintain and enhance the features of the Website, such as website hosting services providers. The use of personally identifiable information is limited to the use needed in order to furnish those services to us. These providers are authorized to use your personal information only as necessary to provide these services to us.
- We may disclose information to others if we believe in good faith that the disclosure is necessary to comply with the requirements of applicable laws, to respond to court orders, judicial or regulatory subpoenas and information requests or to otherwise comply with law enforcement.
- We may disclose information to others if we believe such disclosure is necessary or appropriate to take precautions against liability or to enforce our rights; to protect us and users from unlawful or abusive activity; to investigate and defend ourselves against claims or allegations from third parties; to protect the security or integrity of the Website; or to protect the rights, property or personal safety of Kogama, our users or third parties.
Users may also choose to disclose personally identifiable information in many interactive areas of the Website. These areas include user's public profile page, in-game chat and the games users create. Disclosing personally identifiable information in this way is against the Rules and users should not do it. Once personally identifiable information is made available, it can be collected and used by any person who has access to this content without restriction.
If you have accidentally disclosed personal information, please contact us at www.kogama.com/help/support/.
III. Data Security
At Kogama we utilize physical, administrative and technical safeguards to ensure the security and integrity of our systems used to store personally identifiable information. We use server hosting provided by ISO 27001 certified providers to comply with International Organization for Standardizations standard for data protection. We cannot, however, guarantee the security of any information transmitted to Kogama. Nor can we guarantee that any such information is not being accessed, altered or destroyed by a breach, circumvention, failure or interruption of security measures. Users can always request access to a copy of any stored data, provided they can be clearly identified in relation to the data.