Personal Information we collect and how to collect
- Facebook Login
- All JAKPAT users must register using FB Login and via facebook Login we’ll take your personal information from name, date of birth, no of friends, education and work information, etc.
- We’ll use your FB data for verification. Only FB user with minimum 50 friends would be our valid respondent.
- JAKPAT won’t distribute any information regarding your FB names and data to clients or external parties and keep the information inside JAKPAT’s company
- Phone Number
- All JAKPAT users must verify their phone number to be a valid respondent.
- We’ll collect phone numbers as verification proof and also for reward distribution.
- JAKPAT won’t distribute any information regarding your phone number to clients or external parties and keep the information inside JAKPAT’s company
- ID Verification
- All JAKPAT users must report their valid ID which can be in the form of KTP, SIM or Passport (Indonesia)
- We’ll collect ID through Personal Profile Survey.
- JAKPAT won’t distribute any information regarding your ID Card and data to clients or external parties and keep the information inside JAKPAT’s company
- Basic Profile and Tutorial
- After the verification process in the registration, user will be asked basic profiling question to used as basic verification data and also segmentation targeting by client.
- There are two types of basic profile survey
- First, is about demographic profile of yours : age, religion, gender, location, education, profession, industry, income and expense level.
- Secondly would be more detailed about:
- IT / mobile: IT- mobile content portal theme you prefer, preference map, frequently used SNS, held tablet device and application.
- Transportation: motor and car possession, transportation cost, etc.
- Health: wear lenses / glasses ,smoking, sport, etc.
- Lifestyle: hobbies and life preferences
- Game: game type you are using, game genre preferences, game content, etc
- Beauty: Cosmetics topics, respond to skin type, skin care, cosmetics How to gather, how to buy items
- Home: Marital status, family members, housing type, home ownership
- Finance: The main payment methods, content, and response to a major bank financial topics, trading methods, type of credit card you use,etc
- Passive collection method
- JAKPAT will also collect data passively from the smartphone usage includes apps installed, device used, operating system used, apps run time, etc.
- Data will be used to verify single device ownership.
- Data will be used also for targeting survey.
The purpose of the collection and use of personal information
The company will not collect any personal information, other than the purpose of use, or use it for other purposes without the consent of a third party providing it. takes advantage of for the purpose of collecting personal information, and then the company.
- Membership Management
- Marketing and Advertising
Information collection used to ensure respondent validity.
Information collection used to segmentation feature so client can create a survey that can target specific segment.
Information collection used to create promotional material to attract specific respondent segment
Users and rights and the legal representative of how the event
- The user and his legal representative, at any time you have registered you can view or modify the personal information, and may request the revocation Register.
- If you do not have to correct for errors in the personal information requested in the art until you complete the correct use of personal information or offers. We will also notify, without delay, so that the correction is made to a third party if you have already provided the correct processing results to third parties personal information is incorrect.
Personal Information Technical / Managerial protection measures
In handling the personal information of the user's company is theft, leakage, and loss of personal information, to prevent alteration or damage to ensure the safety and technical / administrative measures taken following.
- Password Encryption
- Measures against hacking
- Minimizing handling and training staff
There is storage and management of encrypted identity (ID) and your password is known only to check and change your personal information only by the person who knows the password.
We have done every effort to prevent damage or leakage of personal information by hacking or a computer virus company. Back up the data from time to time to prepare for and prevent compromise of personal information, and you are to be able to send personal information over the network securely through encrypted communications, such as to prevent leakage or damage to users' personal information and data using the latest anti-virus program . And to control unauthorized access from the outside by using a firewall, and you are trying Certificate to complete the technical devices available to ensure the security of any other system ever.
Limited and agree that your use of the company and to give separate password for it and updated on a regular basis and are always stressed the observance of Privacy at any time through the education of the personnel.
Notice in accordance with policy changes
Announcement date: November 10,2014
Effective Date: November 20,2014