Privacy Policy

Privacy Policy for Glide

Last Updated: 27th Nov 2024

Our Privacy Commitment

At Glide ("we," "our," or "us"), protecting your privacy is fundamental to our business. We specialize in providing seamless event access through facial recognition and QR code technology. This Privacy Policy outlines our commitment to safeguarding your personal information while delivering efficient, secure event entry services.

1. Introduction

Welcome to Glide ("we," "our," or "us"). We are committed to protecting your privacy and personal information while providing our identity verification and event access services. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our services, including our facial recognition technology and QR code system for event access.

2. Information We Collect

2.1 Personal Information

We collect only the information necessary to provide our event access services:

  • Identity Information

    • Full name

    • Date of birth (when required for age verification)

    • Government-issued identification (when required for specific events)

  • Biometric Data

    • Facial biometric data for identity verification

    • Digital photographs captured during enrollment

    • Facial verification images from event check-ins

  • Contact and Account Information

    • Email address

    • Phone number

    • Billing information (for premium services)

    • Account credentials

  • Event-Related Information

    • Event access history

    • QR code usage data

    • Venue check-in/out timestamps

2.2 Technical Information

  • Device information (type, operating system, browser type)

  • IP address

  • Location data

  • Usage data and access patterns

  • QR code usage and scan history

3. How We Use Your Information

We use your personal information for the following purposes:

3.1 Core Service Functionality

  • To verify your identity

  • To generate and manage your unique facial recognition profile

  • To create and manage QR codes for event access

  • To process event entry and exit

  • To maintain security and prevent fraud

3.2 Service Improvement

  • To analyze and improve our services

  • To develop new features and services

  • To enhance user experience

  • To troubleshoot technical issues

3.3 Communication

  • To send service-related notifications

  • To respond to your inquiries and support requests

  • To provide updates about our services

  • To send marketing communications (with your consent)

4. Data Storage and Security

4.3 Data Processing and Real-Time Access

  • Facial recognition processing occurs in real-time using secure, dedicated infrastructure

  • Event access decisions are made within milliseconds while maintaining accuracy

  • Biometric templates are processed in isolated, secure environments

  • Continuous monitoring ensures system reliability and security

  • Multiple backup systems guarantee service availability

  • Regular performance audits optimize speed and accuracy

4.4 Alternative Access Methods

Our QR Code System:

  • Generates unique, encrypted QR codes for each event ticket

  • Updates in real-time to prevent duplicate use

  • Integrates with major ticketing platforms

  • Provides contactless, secure entry when facial recognition isn't required

  • Maintains detailed access logs for security purposes

4.5 Venue Integration and Security

For our venue partners, we:

  • Provide secure API endpoints for system integration

  • Deploy dedicated hardware with encrypted communications

  • Implement role-based access control for venue staff

  • Maintain separate data environments for each venue

  • Provide real-time monitoring and reporting tools

  • Ensure compliance with venue-specific security requirements

4.6 Event-Specific Data Handling

Different events may require different levels of security:

  • High-security events: Full biometric verification with ID matching

  • Standard events: Facial recognition for quick access

  • Basic events: QR code-only access

  • Custom solutions for specific venue requirements

Each security level includes:

  • Appropriate data retention policies

  • Specific security protocols

  • Customized privacy notices

  • Relevant compliance measures

5. Information Sharing and Disclosure

We may share your information with:

5.1 Service Providers

  • Third-party vendors who assist in providing our services

  • Payment processors

  • Cloud storage providers

  • Analytics services

5.2 Event Organizers

  • Limited information necessary for event access

  • Attendance verification data

  • Entry/exit logs

5.3 Legal Requirements

  • Law enforcement agencies when required by law

  • Government bodies in response to legal requests

  • To protect our rights or prevent fraud

6. NFT Bracelet and User-Controlled Data Sharing

6.1 NFT Bracelet Features

Our NFT bracelets allow users to:

  • Store and control personal information of their choice

  • Customize sharing preferences for different events

  • Enable instant information sharing with other attendees

  • Manage digital credentials and access rights

  • Control their digital identity at events

6.2 User-Controlled Information Sharing

Users can:

  • Select which personal information to store on their NFT bracelet

  • Choose what information to share with each interaction

  • Modify sharing preferences at any time

  • Revoke access to previously shared information

  • View a log of all sharing activities

6.3 Data Protection for NFT Features

We protect NFT-related data through:

  • Blockchain-based security measures

  • End-to-end encryption for shared information

  • Secure peer-to-peer data transfer protocols

  • Decentralized data storage

  • User-controlled encryption keys

6.4 NFT Data Privacy Controls

Users maintain control over:

  • Which data points are stored on their NFT

  • Who can access their shared information

  • Duration of information accessibility

  • Revocation of sharing permissions

  • Historical sharing records

6.5 Third-Party Interactions

When sharing information via NFT bracelets:

  • Recipients must agree to our data handling terms

  • Shared data is encrypted during transfer

  • Users receive notifications of successful shares

  • All sharing transactions are logged

  • Users can track who has accessed their information

6.13 Physical Bracelet Security

Device Security:

  • Tamper-evident physical design

  • Unique device identification

  • Encrypted hardware elements

  • Automatic deactivation if compromised

  • Water and damage resistant

Lost/Stolen Device Procedures:

  • Immediate remote deactivation

  • Real-time security alerts

  • Quick profile transfer to replacement device

  • Historical data recovery

  • Zero-knowledge backup system

6.14 Event Integration Features

Platform Compatibility:

  • Seamless event app integration

  • Cross-platform functionality

  • Real-time synchronization

  • Multi-device support

  • Offline capability

Industry-Specific Features:

  • Conference mode with session tracking

  • Concert/Festival social discovery

  • Trade show lead collection

  • VIP event exclusive features

  • Corporate event security protocols

6.15 Group Features & Team Management

Team Functionality:

  • Group profile management

  • Team member discovery

  • Shared contact pools

  • Department-level privacy settings

  • Corporate directory integration

Organizational Controls:

  • Admin dashboard for team management

  • Bulk privacy settings

  • Group policy enforcement

  • Activity monitoring tools

  • Corporate compliance features

6.16 Best Practices & Guidelines

Information Sharing Guidelines:

  • Recommended privacy settings by event type

  • Professional networking best practices

  • Personal information protection tips

  • Social media integration guidelines

  • Digital identity management advice

Event-Specific Recommendations:

  • Professional conferences

  • Social events

  • Industry trade shows

  • Music festivals

  • Sports events

  • Corporate gatherings

6.17 Emergency Procedures & Recovery

Emergency Protocols:

  • 24/7 support access

  • Emergency profile lockdown

  • Rapid response team

  • Security incident reporting

  • Law enforcement cooperation

Data Recovery:

  • Cloud backup options

  • Profile restoration

  • Connection history recovery

  • Share history logs

  • Activity audit trails

6.18 Special Event Considerations

VIP Features:

  • Enhanced privacy controls

  • Exclusive sharing options

  • Priority support access

  • Advanced security features

  • Custom privacy protocols

Event-Specific Privacy:

  • Age-restricted event controls

  • Industry-specific compliance

  • Regional privacy requirements

  • Custom security protocols

  • Special event rules

8. International Data Transfers

If we transfer your information to other countries, we will ensure appropriate safeguards are in place to protect your information and comply with applicable data protection laws.

9. Changes to This Privacy Policy

We may update this Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page and updating the "Last Updated" date.

10. Contact Us

If you have any questions about this Privacy Policy or our practices, please contact us at:

Glide [Your Company Address] Email: [privacy@glide.com] Phone: [Your Phone Number]

11. Biometric Data Specific Provisions

11.1 Biometric Data Collection and Use

  • We collect biometric data through facial recognition technology

  • This data is used solely for identity verification and event access

  • Biometric templates are created and stored securely

  • Raw biometric data is deleted after template creation

11.2 Biometric Data Protection

  • Advanced encryption for biometric templates

  • Regular security audits and assessments

  • Strict access controls and monitoring

  • Compliance with biometric privacy laws

12. Compliance with Privacy Laws

We comply with applicable privacy laws including:

  • General Data Protection Regulation (GDPR)

  • California Consumer Privacy Act (CCPA)

  • Biometric Information Privacy Laws

  • State-specific privacy regulations

3. Cookie Policy

Our cookie policy explains how we use cookies and similar technologies. You can control cookie preferences through your browser settings. These technologies help us:

  • Improve user experience

  • Remember your preferences

  • Analyze service usage

  • Enhance security measures

  • Provide relevant features

14. Notice to California Residents

Under the California Consumer Privacy Act (CCPA) and California Privacy Rights Act (CPRA), California residents have specific rights regarding their personal information:

  • Right to know what personal information is collected

  • Right to delete personal information

  • Right to opt-out of the sale of personal information

  • Right to correct inaccurate personal information

  • Right to limit use of sensitive personal information

15. International Data Transfers

For users outside the United States:

  • Data may be transferred to and processed in the United States

  • We implement appropriate safeguards for international transfers

  • We comply with applicable data protection laws

  • Users consent to cross-border data transfers

  • Additional protections for EU/UK residents apply

16. Updates to Privacy Policy

We may update this Privacy Policy periodically to reflect:

  • Changes in our practices

  • New features and services

  • Legal and regulatory requirements

  • Security enhancements

  • User feedback and concerns

17. Contact Information

For privacy-related inquiries: Glide [Company Address] Email: privacy@glide.com Phone: [Phone Number] Privacy Officer: [Name/Title]

18. Event Organizer Guidelines

For event organizers using Glide:

  • Data handling requirements

  • Privacy compliance obligations

  • User consent requirements

  • Security protocols

  • Emergency procedures

19. Venue Partner Requirements

Venue partners must:

  • Maintain security standards

  • Protect user privacy

  • Follow data handling protocols

  • Report security incidents

  • Train staff appropriately

  • Implement access controls

  • Monitor system usage

  • Update security measures regularly

  • Conduct regular audits

  • Document compliance efforts

20. Event Access Services

20.1 Access Methods

  • Facial recognition entry

  • QR code scanning where ID isn't required

  • NFT bracelet tap-to-share features

  • Emergency override protocols

  • Venue staff authentication

20.2 Entry Processing

  • Real-time identity verification

  • Instant access decisions

  • Queue management

  • Multiple entry point support

  • Backup check-in procedures

20.3 Access Security

  • Fraud prevention measures

  • Entry attempt logging

  • Access point monitoring

  • Security alert systems

  • Unauthorized entry prevention

21. Data Retention

21.1 Active Event Data

  • Entry/exit logs: 90 days

  • Identity verification data: Duration of account

  • NFT sharing history: 90 days

  • Security logs: 2 years

  • Event access credentials: Event duration

21.2 Account Management

  • Account maintenance

  • Data updates

  • Access history

  • Security monitoring

  • Profile management

22. Service Support

22.1 Technical Support

  • Entry system support

  • Access troubleshooting

  • NFT bracelet assistance

  • Security incident response

  • System maintenance

23. Service Updates

We may implement new technologies to enhance entry services:

  • Improved verification speeds
  • Enhanced security measures
  • New access methods
  • Updated safety protocols
  • System upgrades

This Privacy Policy was last updated on 4th of December 2024 Version: 1.0