Data Use Policy (Exposing the Invisible)

Why isn't this a "Privacy Policy"?

Many websites link to their “privacy policies” from their homepages, but those policies are less about describing how much privacy they offer and more about how they plan to use your data. We believe that it is important to be transparent that this policy is a promise about how we will use the data you leave when you visit this site, but neither this promise nor the promise of any other site gives you full privacy.

The Data Use Policy is a compulsory legal disclosure of how a website operator collects, retains and shares personally identifiable information. In other words, it’s often a list of ways your personal data is not private and under their control. There are legitimate reasons that people and organisations running websites need to keep data about your visits. We limit the data that we keep to only what we need for maintaining the site and satisfying legal and funding-related reporting requirements.

Visiting Exposing the Invisible

Exposing the Invisible is operated by Tactical Technology Collective, a non-profit operating from Berlin, Germany and is governed by EU Data law.

When you visit this site, we collect information about your visit of the sort that web browsers and servers typically make available. This is information like:

  • what kind of device you are using (phone or computer),
  • which browser you are using,
  • the language preference of your browser,
  • the site that linked you here, if one did,
  • the date and time of each visit.

We do this to better understand how people use the site and so we can fix problems with the site when they arise. From time to time, we also release reports that include very general information about who visits this site, like the total number of visitors or which countries or other websites comprise the most visits.

We also collect information that is unique to you, like Internet Protocol (IP) addresses. We use this information to protect our servers from misuse. We do not use this information to identify Exposing the Invisible visitors.

We may collect statistics about the behaviour of visitors of Exposing the Invisible. For instance, we may collect information about how long a visitor stays on a page or on the site. We do this so that we can figure out how we can improve the quality of our content and guides.

We collect this information using open source analytics software, which we host ourselves. This means that even the people who wrote the software do not see any of your information. We do not partner with third parties to collect this information, nor do we share information with third parties, with the exception of the release of non-personally-identifying information in formats described above.

Cookies

An internet cookie is a string of information that a website stores on a visitor’s computer. The next time that browser visits a website set up to access that cookie, the cookie sends information to the website. Different cookies contain different kinds and amounts of information. Cookies play a role in lots of different things from tracking you across sites, to loading accessibility preferences, to keeping you logged into websites and services. Just like real cookies, some are worth eating and others are unhealthy and not delicious enough to be part of your life.

We use cookies to help the site identify and track visitors to our content and their website access preferences. We do not keep track of that information. Instead, the cookie lets you store that locally and delete it any time you want.

Exposing the Invisible visitors who do not wish to have cookies placed on their computers should set their browsers to refuse cookies before using this site. Exposing the Invisible uses local storage and cookies to track your interaction with the site. This is stored in your browser. At no point is this transmitted to a remote server or associated with your browsing activity.

In the event that you choose to use Exposing the Invisible in a web browser with blocked cookies, we have designed it to remain as functional and feature-complete as possible.

JavaScript

At this time, Exposing the Invisible uses JavaScript for some visual elements of the site.. Should you choose to disable JavaScript, you will be able to browse the site but some visual elements may not render properly.

Changes to this Policy

Although most changes are likely to be minor, we may change Exposing the Invisible's Data Use Policy from time to time, in response to legal and technical changes and at our discretion. We encourage visitors to frequently check this page for any changes to this Data Use Policy. Your continued use of this site after any change in this Data Use Policy constitutes your acceptance of these change.

Contacts

All questions related to the data use policies of Exposing the Invisible should be directed in writing to the Tactical Tech Data Protection Officer.

Disclaimer

The content of Exposing the Invisible has been chosen to provide activists and independent investigative reporters with inspirational stories and useful resources to incite them to pursue their own investigations to increase transparency and expose wrongdoings.

Exposing the Invisible does not guarantee that the resources suggested are appropriate to all cases. The legality, appropriateness and relevance of these tools will vary from one situation to another.

If you have any questions about appropriate use within your specific context or country, please feel free to come andtalk to us.We will be happy to provide counselling to the best of our knowledge and abilities.

The resources referenced herein and our ad hoc advice given as a response to specific requests are provided "as is" without warranty of any kind, either expressed or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. In no event shall the Tactical Technology Collective or any agent or representative thereof be liable for any direct, indirect, incidental, special, exemplary, or consequential damages (including, but not limited to, procurement of substitute goods or services; loss of use, data, or profits; or business interruption), however caused under any theory of liability, arising in any way out of the use of or inability to make use of this software, even if advised of the possibility of such damage.

The views and opinions expressed on Exposing the Invisible films and sketches are those of the persons appearing in the films and sketches and do not necessarily reflect the views and opinions of the Tactical Technology Collective.