Kevin Yun
In order to provide its services, BlitzBear may engage third parties or other members of the BlitzBear corporate group (affiliates) to carry out data-processing activities that involve access to customer data. These organizations, called “subprocessors,” are identified below with their locations and the types of services they provide to BlitzBear.
Name | Country | Description | Type of Service | Mandatory |
Cloudflare | United States | Web performance and security | Technology | Required |
ComplyDog | United States | a compliance management software for small businesses. | Compliance management software | Required |
Counter | United States | a web analytics service that tracks website traffic. | Web analytics | Required |
Crisp | United States | Discover our Business Messaging Platform for Startups & SMBs. The one-stop for sales, marketing & support in one platform: Crisp. 14 Days free trial. No credit card required. Try now! We provide Knowledge base, Team Inbox, Chatbot, CRM and multiple other features to let you build your own way to customer success. | Technology | Required |
Googleapis | United States | a set of APIs developed by Google for accessing Google services. | APIs | Required |
Gstatic | United States | a content delivery network (CDN) offered by Google. | Content delivery network | Required |
bunny.net | United States | Hop on bunny.net and speed up your web presence with the next-generation Content Delivery Service (CDN), Edge Storage, and Optimization Services at any scale. | Technology | Required |
instant.page | Belgium | a JavaScript library that preloads pages on mouse hover. | Page preloading library | Required |
jquery | United States | jQuery: The Write Less, Do More, JavaScript Library | Technology | Required |
Google Analytics | United States | a web analytics service offered by Google. | Web analytics | Not Required |
Googletagmanager | United States | a tag management system offered by Google. | Tag management system | Not Required |
United States | Create an account or log into Facebook. Connect with friends, family and other people you know. Share photos and videos, send messages and get updates. | Social media platform | Not Required | |
Factors.ai | United States | B2B Account Analytics, Attribution & Activation | Marketing technology | Required |
Counter.dev | United States | Website analytics | Website analytics | Required |
Firebase | United States | Managed authentication and database hosting | Cloud hosting provider | Required |
Posthog | United States | Product analytics | Analytics provider | Required |
Clearbit | United States | B2B Marketing intelligence for identifying website visitors | Marketing technology | Required |
Stripe | United States | Stripe makes it easy for developers to accept credit cards on the web. | Payment processor and subscription management | Required |
GrowSurf | United States | Track user signups coming from referral links | Customer referral software | Required |
Digital Ocean | Germany | Server and database hosting | Cloud hosting provider | Required |
Logsnag | United States | Track every inch of your product, monitor potential issues or opportunities, and respond by making data-driven decisions. | Realtime monitoring | Required |
Vector.co | United States | Reveal the most interested buyers on & off your site — turn them into revenue with hyper-targeted campaigns & ad audiences | Marketing technology | Required |
RB2B | United States | Person-Level Website Visitor Identity | Marketing technology | Required |
Please see our frequently asked questions below. Please keep in mind that this is not legal advice and we recommend consulting with your internal compliance team or privacy attorney for guidance on compliance matters. BlitzBear is committed to helping our customers comply with applicable laws, but we cannot guarantee that your use of our products will be fully compliant. As always, we recommend seeking professional legal counsel for any specific questions or concerns.
Should I get consent from a customer to collect their personal data? | While it is always good practice to receive explicit consent from your customer, certain laws and regulations (such as the GDPR) require consent prior to collecting personal data of certain individuals (such as those in the EU). It is also important to note that under GDPR, consent is one of a number of legitimate interests for processing data. Others include the need to process for the performance of a contract, the need to process in order to comply with a legal obligation, and the need to process in order to protect the vital interests of the data subject or another natural person. Full details can be found in Article 6 of GDPR. |
Can I modify a customer’s personal data? | Yes, you can modify all data to correct personal data as required by GDPR when you receive a Subject Access Request, or for other reasons. Simply contact us and we will work with you to make the adjustments. |
Can I delete personal data? | Yes, you can delete any data, including data that contains personal data, as required by GDPR. You can also remove all other requested customer data by sending us a data request. |
Is personal data permanently deleted when I remove it? | A deleted data or person is initially flagged for deletion, and may be recovered by our team upon request. After 90 days, the deletion becomes permanent and unrecoverable. |
How long is personal data retained in BlitzBear if I don’t delete it? | BlitzBear’s philosophy is that customers own and control all the data they collect. Any retention period required by law or your company policy is controlled by you. You should ensure that all people and personal data are deleted prior to stopping your usage of BlitzBear, especially if required by policy, law, or regulation. |
Does my data get included in backups, and if so, for how long? | Yes. BlitzBear backs up all customer data, and retains the backups for 90 days. After 90 days, the backup is deleted. |
Can I delete customer’s personal data from BlitzBear backups? | No. The backup dataset contains all customer data, and is used for disaster recovery purposes only. This is required for legal and compliance reasons related to availability obligations. Any personal data in these backups will be permanently deleted after 90 days. |
Does BlitzBear ensure that my data is accessed only by employees with reasonable justification for doing so? | As required by GDPR, only qualified BlitzBear employees with a specific need are permitted to access your account. The typical reason for accessing your account would be upon your specific request for support. |
Does BlitzBear use sub-processors that process my data? | BlitzBear presently uses sub-processors to provide the service. As required by GDPR, BlitzBear maintains a list of those sub-processors here. |
If a data breach occurs with the BlitzBear platform that affects my data, how and when will I be notified? | If a confirmed data breach occurs that is caused by BlitzBear’s actions or inactions, we will, without undue delay, notify the account owner. Information about the breach will be released as it becomes available, as allowed by GDPR. The account owner will be the main point of contact for all notifications, and will be kept aware of the investigation and remediation efforts as they progress. |
How can I comply with a Subject Access Request and portability as required by GDPR? | As you know about the data you are collecting, you are responsible for handling any Subject Access Request (SAR). BlitzBear only provides the platform and wouldn’t know the details about your customizations, properties, or your customers. A SAR means that a customer is asking about information being collected about him or her. If you collected personal data of an EU citizen or a person residing in the EU, you may have a legal obligation to respond to a SAR. Data may be downloaded in industry-standard formats for data portability to comply with GDPR. If BlitzBear receives a SAR, it will do its best to contact the owner. It may not always be possible to know what who the rightful owner is. |
How do I comply with a Subject Access Request to “be forgotten?” | Similar to the above, you know what data you have. If you collected personal data of an EU citizen or a person residing in the EU, you may have a legal obligation to respond and comply with a request to delete all identifiable data. As previously stated, you have the ability to delete a customer's data. |
How does BlitzBear comply with its GDPR obligations to return or destroy all EU personal data? | BlitzBear provide easy ways to download all your data in industry-standard formats. And, as previously described, you may easily delete data, and entire histories for a customer. |
How does BlitzBear comply with its GDPR obligations to encrypt personal data? | All data stored in our primary databases and backups are encrypted using an industry standard strong cipher. All data transmitted to the BlitzBear platform are encrypted using the industry standard TLS protocol. |
How can I ensure my customers that BlitzBear security meets applicable law and the GDPR (Article 32)? | BlitzBear is committed to safeguarding your data. We use sophisticated controls during processing to maintain the confidentiality, integrity, availability, and resilience of your data. Our Security page outlines the details of our application security, network security, policies, and more. As related to Article 28 in the GDPR, BlitzBear will only process personal data according to your instructions. In other words, the commands you use in the product are the “instructions,” and BlitzBear does not use personal data for any other means. In addition, it does not transfer personal data to a third party without your consent. If personal data is transferred from the EU to a third country, then adequate safeguards will apply to the transfer (such as the EU-US Privacy Shield Framework). BlitzBear has developed recovery procedures to minimize downtime related to a disaster, with the ability to restore access to personal data in a timely manner in the event of a physical or technical incident. We regularly test, assess and evaluate the effectiveness of our technical and organizational measures to ensure the security of the processing. |