By accessing or using the Service, you (“User,” “Customer,” “you,” or “your”) acknowledge that you have read, understood, and agree to be bound by this Policy and our Terms of Service. If you do not agree to this Policy, you must immediately discontinue use of the Service.
1.6 Applicable Privacy Laws: All federal, state, local, and international laws, regulations, and rules governing privacy, data protection, and data security, including but not limited to: the Colorado Privacy Act (CPA), California Consumer Privacy Act (CCPA) as amended by the California Privacy Rights Act (CPRA), Virginia Consumer Data Protection Act (VCDPA), Connecticut Data Privacy Act (CTDPA), Utah Consumer Privacy Act (UCPA), General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA) where applicable, Children’s Online Privacy Protection Act (COPPA), Gramm-Leach-Bliley Act (GLBA), Telephone Consumer Protection Act (TCPA), CAN-SPAM Act, state data breach notification laws, and any successor or replacement legislation.
2.3 To the extent there is any conflict between this Policy and Applicable Privacy Laws, Applicable Privacy Laws shall control.
- (a) Ensuring it has all necessary rights, consents, and legal bases to collect and provide End User Personal Information to Company;
- (b) Compliance with all Applicable Privacy Laws in its collection, use, and disclosure of End User Personal Information;
- (c) Providing required notices to End Users regarding the Processing of their Personal Information;
- (d) Obtaining all necessary consents from End Users for the Processing of their Personal Information;
- (e) Responding to End User requests regarding their Personal Information rights;
- (f) Determining the purposes and means of Processing End User Personal Information.
- (a) As instructed by Customer through Customer’s use of the Service;
- (b) As necessary to provide the Service;
- (c) As required by Applicable Privacy Laws;
- (d) As otherwise authorized in writing by Customer.
3.4 Nothing in this Policy restricts Company’s rights or obligations as a Controller with respect to data for which it is the Controller.
- (a) Identification Information: Full legal name, business name, DBA name, email address, telephone number, business address, billing address;
- (b) Authentication Information: Username, password (encrypted), security questions and answers, multi-factor authentication credentials;
- (c) Financial Information: Payment card information (processed by third-party payment processors; not stored by Company), bank account information (for ACH payments), billing history, transaction records, tax identification numbers;
- (d) Business Information: Business entity type, industry classification, number of locations, employee count, business hours, service offerings, pricing structures;
- (e) Communication Records: Email correspondence, support tickets, chat transcripts, phone call recordings (where legally permitted with notice), survey responses, feedback submissions.
- (a) Identification Information: Names, email addresses, phone numbers, postal addresses, dates of birth, gender, profile photographs;
- (b) Membership Information: Membership types, subscription levels, membership start/end dates, membership status, contract terms, emergency contacts;
- (c) Financial Information: Payment methods, billing history, payment status, outstanding balances, refund records;
- (d) Activity Information: Check-in/check-out times, class attendance, personal training sessions, facility access logs, equipment usage, workout tracking data;
- (e) Health Information (if provided by Customer): Medical conditions, physical limitations, injury history, fitness assessments, body measurements, health questionnaire responses (Customer acknowledges this may constitute Protected Health Information under HIPAA and agrees to comply with all applicable requirements);
- (f) Communication Preferences: Email preferences, SMS preferences, notification settings, language preferences;
- (g) Behavioral Data: Service usage patterns, feature utilization, session duration, navigation paths, click patterns.
- (a) Technical Information: IP address, MAC address, device identifiers (IDFA, Android ID), browser type and version, operating system, device manufacturer and model, screen resolution, time zone settings, browser plug-in types and versions, network connection type;
- (b) Usage Information: Log files, pages visited, features accessed, time spent on pages, referring/exit pages, clickstream data, search queries, error logs, performance metrics, API calls;
- (c) Location Information: IP-based geolocation data, GPS coordinates (if Customer enables location services), Wi-Fi access points, cell tower information;
- (d) Cookie Information: Cookie identifiers, cookie preferences, tracking pixel data, web beacon data, local storage data.
- (a) Data enrichment services;
- (b) Marketing partners;
- (c) Social media platforms (if Customer connects accounts);
- (d) Public databases and government records;
- (e) Credit reporting agencies (for fraud prevention);
- (f) Identity verification services.
- (a) Assumes all liability and risk associated with such submission;
- (b) Agrees to indemnify and hold Company harmless for any claims, damages, or liabilities arising from such submission;
- (c) Represents and warrants that it has obtained all necessary consents and legal authorizations;
- (d) Acknowledges that Company’s security measures may not be sufficient for such data categories.
- (a) Account creation, authentication, and management;
- (b) Processing transactions and payments;
- (c) Providing core Service functionality (member check-ins, class scheduling, payment processing, reporting, communications);
- (d) Storing and managing Customer and End User data;
- (e) Sending transactional communications (receipts, confirmations, account notifications);
- (f) Customer support and technical assistance;
- (g) Service optimization and performance enhancement.
- (a) Billing, accounting, and financial reporting;
- (b) Fraud detection and prevention;
- (c) Security monitoring and incident response;
- (d) Internal analytics and business intelligence;
- (e) Product development and improvement;
- (f) Quality assurance and testing;
- (g) Legal compliance and regulatory reporting.
- (a) Service announcements and updates;
- (b) Feature releases and product news;
- (c) Marketing communications (with opt-in consent where required);
- (d) User surveys and feedback requests;
- (e) Renewal notices and payment reminders.
- (a) Compliance with legal obligations, court orders, and government requests;
- (b) Enforcement of Terms of Service and other agreements;
- (c) Protection of Company’s rights, property, and safety;
- (d) Protection of users’ rights, property, and safety;
- (e) Investigation of suspected fraud, violations, or illegal activity;
- (f) Response to lawful requests from public authorities;
- (g) Establishment, exercise, or defense of legal claims.
- (a) Fraud detection and risk assessment;
- (b) Service personalization and recommendations;
- (c) Anomaly detection and security monitoring;
- (d) Usage analytics and reporting.
- (a) Industry research and benchmarking;
- (b) Product development and improvement;
- (c) Marketing and promotional purposes;
- (d) Public reporting and thought leadership.
Company takes commercially reasonable measures to ensure such data cannot be re-identified.
- (a) Cloud Infrastructure Providers: Amazon Web Services (AWS), Google Cloud Platform, Microsoft Azure;
- (b) Payment Processors: Stripe, Square, Authorize.net, PayPal;
- (c) Communication Services: SendGrid, Twilio, Amazon SES, Mailgun (for email and SMS);
- (d) Customer Support: Zendesk, Intercom, Help Scout;
- (e) Analytics Providers: Google Analytics, Mixpanel, Amplitude;
- (f) Security Services: Cloudflare, Datadog, New Relic;
- (g) Backup and Disaster Recovery: Backblaze, Veeam;
- (h) Professional Services: Legal counsel, accountants, auditors, consultants.
- (i) Use Personal Information only as instructed by Company;
- (ii) Implement appropriate security measures;
- (iii) Comply with Applicable Privacy Laws;
- (iv) Return or delete Personal Information upon termination (unless legally required to retain);
- (v) Cooperate with Company in responding to data subject requests.
- (a) Provide notice of such transfer via email and/or prominent notice on the Service at least thirty (30) days prior to transfer;
- (b) Require the successor entity to continue to honor this Policy or provide users with notice and choice regarding use of their Personal Information.
- (a) In response to valid subpoenas, court orders, or legal process;
- (b) To comply with applicable laws, regulations, or governmental requests;
- (c) To detect, prevent, or address fraud, security, or technical issues;
- (d) To protect against harm to the rights, property, or safety of Company, users, or the public;
- (e) To establish, exercise, or defend legal claims.
Except as expressly authorized in this Policy or in a separate written agreement, Company will not disclose, transfer, or permit access to Personal Information by third parties.
- (a) Standard Contractual Clauses approved by the European Commission;
- (b) Adequacy decisions issued by the European Commission;
- (c) Other legally valid transfer mechanisms as approved under Applicable Privacy Laws.
- (a) Encryption of data in transit and at rest;
- (b) Access controls and authentication requirements;
- (c) Contractual commitments with service providers;
- (d) Regular security assessments and audits.
- (a) Encryption of data in transit using TLS 1.2 or higher;
- (b) Encryption of data at rest using AES-256 or equivalent;
- (c) Secure authentication mechanisms, including multi-factor authentication;
- (d) Firewalls and intrusion detection/prevention systems;
- (e) Regular security patching and updates;
- (f) Vulnerability scanning and penetration testing;
- (g) Log monitoring and security information event management (SIEM);
- (h) Data loss prevention (DLP) controls;
- (i) Secure backup and disaster recovery systems.
- (a) Security policies and procedures;
- (b) Employee background checks and screening;
- (c) Confidentiality agreements with employees and contractors;
- (d) Security awareness training programs;
- (e) Incident response and breach notification procedures;
- (f) Access control policies based on principle of least privilege;
- (g) Regular security audits and risk assessments;
- (h) Third-party security assessments and certifications.
- (a) Secure data center facilities with controlled access;
- (b) Environmental controls (temperature, humidity, fire suppression);
- (c) 24/7 monitoring and surveillance;
- (d) Redundant power and network infrastructure;
- (e) Physical access logs and visitor management.
- (a) No method of transmission or storage is 100% secure;
- (b) Company cannot guarantee absolute security of Personal Information;
- (c) Unauthorized access, hardware or software failure, and other factors may compromise security;
- (d) Customer is responsible for maintaining security of Customer’s account credentials;
- (e) Customer must notify Company immediately of any unauthorized access or security breach.
- (a) Use strong, unique passwords for all accounts;
- (b) Enable multi-factor authentication where available;
- (c) Maintain up-to-date security software on devices accessing the Service;
- (d) Not share account credentials with unauthorized persons;
- (e) Promptly report any suspected security incidents to Company;
- (f) Follow Company’s security best practices and recommendations;
- (g) Configure appropriate access controls and permissions for End Users.
- (a) Conduct a prompt investigation to determine the scope and impact;
- (b) Take reasonable steps to contain and remediate the breach;
- (c) Notify affected Customer(s) without unreasonable delay and within timeframes required by Applicable Privacy Laws;
- (d) Provide information about the breach, affected data, and remediation steps;
- (e) Cooperate with Customer in fulfilling Customer’s notification obligations to End Users and regulatory authorities;
- (f) Document the breach and response actions.
Customer acknowledges that notification timing and content may be subject to law enforcement or regulatory investigation needs.
- Personal Information is retained for the duration of the active account relationship.
- Personal Information is retained for ninety (90) days following account termination or cancellation, except as otherwise required by law or specified below.
- Financial records: Seven (7) years from date of transaction (or longer as required by tax laws);
- Contract documents: Seven (7) years from contract termination;
- Legal holds: Duration of litigation or investigation;
- Fraud prevention records: Five (5) years from incident;
- Communication records: Two (2) years from last communication.
- Data may persist in backup systems for up to ninety (90) days after deletion from production systems.
- (a) Permanently delete Personal Information from production systems;
- (b) Render Personal Information anonymous or unrecoverable;
- (c) Overwrite storage media in accordance with NIST 800-88 guidelines or equivalent;
- (d) Maintain records of deletion for audit purposes.
- (a) Required to preserve information for litigation, investigation, or audit;
- (b) Subject to a legal hold or preservation order;
- (c) Information is relevant to an ongoing dispute or claim;
- (d) Required by regulatory authority.
Customer may request extended retention of Personal Information by providing written notice at least thirty (30) days prior to scheduled deletion. Company may, in its sole discretion, approve such requests and may charge reasonable fees for extended retention services.
- (a) Confirm whether Company is Processing Personal Information;
- (b) Obtain a copy of Personal Information in Company’s possession;
- (c) Receive information about Processing activities (purposes, categories, recipients, retention periods).
- (a) Request correction of inaccurate Personal Information;
- (b) Request completion of incomplete Personal Information.
- (a) Request deletion of Personal Information, subject to legal exceptions including:
- (i) Completing transactions for which information was collected;
- (ii) Detecting and preventing security incidents or fraud;
- (iii) Debugging and repairing functionality;
- (iv) Complying with legal obligations;
- (v) Internal uses reasonably aligned with consumer expectations;
- (vi) Otherwise permitted by Applicable Privacy Laws.
- (a) Receive Personal Information in a structured, commonly used, machine-readable format;
- (b) Transmit Personal Information to another controller (where technically feasible).
- (a) Sale of Personal Information (Company does not sell Personal Information);
- (b) Targeted advertising (where applicable);
- (c) Certain automated profiling decisions;
- (d) Marketing communications (with exception for transactional messages).
- (a) Request temporary restriction of Processing in certain circumstances;
- (b) Object to Processing based on legitimate interests.
- (a) Object to Processing for direct marketing purposes;
- (b) Object to Processing based on legitimate interests;
- (c) Object to automated decision-making.
- (a) Withdraw previously provided consent for Processing;
- (b) Withdrawal does not affect lawfulness of Processing prior to withdrawal.
- (a) File a complaint with relevant supervisory authority or data protection authority;
- (b) Pursue remedies through regulatory or judicial proceedings.
- Email: privacy@gymwyse.com
- Mail: The Algorithm, ATTN: Privacy Rights, 5031 Ashbrook Circle, Highlands Ranch, CO 80130
- (a) Matching information provided in request to information on file;
- (b) Signed declaration under penalty of perjury;
- (c) Government-issued identification;
- (d) Additional documentation as reasonably necessary.
- (a) Written authorization signed by the individual;
- (b) Proof of agent’s authority;
- (c) Verification of individual’s identity.
- (a) Within forty-five (45) days of receipt (as required by CPA/CCPA);
- (b) May extend response period by additional forty-five (45) days where reasonably necessary, with notice to requestor;
- (c) Within thirty (30) days for GDPR requests (extendable by additional sixty (60) days with justification).
- (a) Provide explanation for denial;
- (b) Cite applicable legal exceptions or limitations;
- (c) Provide information about appeal rights (where applicable);
- (d) Provide contact information for relevant supervisory authority.
- (a) Denying goods or services;
- (b) Charging different prices or rates;
- (c) Providing different quality of goods or services;
- (d) Suggesting individual will receive different prices, rates, or quality.
- (a) Reasonably related to value provided by the data;
- (b) Opt-in and revocable;
- (c) Compliant with Applicable Privacy Laws.
- (a) Authentication and account access;
- (b) Security and fraud prevention;
- (c) Service functionality and features;
- (d) Load balancing and performance;
- (e) Legal compliance.
- (a) Language preferences;
- (b) User interface settings;
- (c) Feature customization;
- (d) Remember user selections.
- (a) Usage statistics and patterns;
- (b) Feature adoption metrics;
- (c) Error tracking and debugging;
- (d) Performance optimization.
- (a) Marketing campaign tracking;
- (b) Conversion measurement;
- (c) Retargeting (with consent where required);
- (d) Interest-based advertising.
- (a) Browser settings (block all, block third-party, delete cookies);
- (b) Cookie preference center (if provided);
- (c) Opt-out mechanisms provided by third parties.
- (a) Analytics providers;
- (b) Advertising networks;
- (c) Social media platforms;
- (d) Content delivery networks.
- (a) Device identifiers (IDFA, Android ID);
- (b) App usage data;
- (c) Crash reports;
- (d) Location data (with permission).
Users may control mobile tracking through device settings.
- (a) Is solely responsible for complying with COPPA and other applicable laws;
- (b) Must obtain verifiable parental consent before collection;
- (c) Must provide required notices to parents;
- (d) Must honor parental rights requests;
- (e) Indemnifies Company for any violations or claims related to children’s data.
- (a) Company will take steps to delete such information as soon as reasonably practicable;
- (b) Company will notify Customer of the issue;
- (c) Customer remains responsible for any legal violations.
- (a) Review Personal Information collected from their child;
- (b) Request deletion of such information;
- (c) Refuse further collection or use of such information.
Contact privacy@gymwyse.com to exercise parental rights.
- (a) Right to know what Personal Information is collected, used, and shared;
- (b) Right to delete Personal Information (subject to exceptions);
- (c) Right to correct inaccurate Personal Information;
- (d) Right to opt-out of sale or sharing of Personal Information;
- (e) Right to limit use of Sensitive Personal Information;
- (f) Right to non-discrimination for exercising rights;
- (g) Right to opt-in for sale of information for consumers ages 13-15.
- (a) Identifiers (names, email addresses, IP addresses, account names);
- (b) Customer records information (contact information, payment information);
- (c) Commercial information (transaction history, purchasing behavior);
- (d) Internet or electronic network activity (browsing history, interaction with Service);
- (e) Geolocation data (IP-based location);
- (f) Professional or employment information (business type, role);
- (g) Inferences (preferences, characteristics, behavior).
- (a) Providing requested services;
- (b) Security and integrity purposes;
- (c) Short-term, transient use;
- (d) Performing services on behalf of Customer;
- (e) Quality assurance and improvement;
- (f) Purposes that do not infer characteristics about individuals.
Registered users under age 18 may request removal of content or information posted by the user. Contact privacy@gymwyse.com for assistance. Removal may not ensure complete deletion from all systems.
Colorado residents may appeal denial of rights requests by contacting privacy@gymwyse.com within forty-five (45) days of denial. Company will respond to appeals within forty-five (45) days. If appeal is denied, residents may contact the Colorado Attorney General.
- (a) Targeted advertising (Company does not engage in targeted advertising);
- (b) Sale of Personal Information (Company does not sell Personal Information);
- (c) Profiling in furtherance of decisions that produce legal or similarly significant effects.
If Company processes Sensitive Data (as defined by applicable state law), Company obtains consent as required by law.
- (a) Contractual Necessity: Processing necessary to perform contract with Customer or take pre-contractual steps;
- (b) Legitimate Interests: Processing necessary for Company’s legitimate business interests (service improvement, security, fraud prevention), provided such interests are not overridden by data subject rights;
- (c) Legal Obligation: Processing necessary to comply with legal obligations;
- (d) Consent: Where explicit consent is obtained;
- (e) Vital Interests: Processing necessary to protect vital interests of data subject or another person.
- (a) Right of access;
- (b) Right to rectification;
- (c) Right to erasure (“right to be forgotten”);
- (d) Right to restriction of processing;
- (e) Right to data portability;
- (f) Right to object;
- (g) Rights related to automated decision-making and profiling.
- (a) EEA data subjects: Supervisory authority in Member State of habitual residence, place of work, or place of alleged infringement;
- (b) UK data subjects: Information Commissioner’s Office (ICO).
If required to appoint a Data Protection Officer (DPO) under GDPR, contact details will be provided here. Currently, no DPO is appointed as Company does not meet mandatory appointment thresholds.
As additional states enact comprehensive privacy laws, Company will update this Policy to reflect applicable rights and obligations.
- (a) Account verification and security notices;
- (b) Service updates affecting functionality;
- (c) Billing and payment notifications;
- (d) Responses to support requests;
- (e) Legal notices and policy updates.
- (a) Clicking “unsubscribe” in marketing emails;
- (b) Adjusting email preferences in account settings;
- (c) Contacting privacy@gymwyse.com.
- (a) Reply STOP to any SMS message;
- (b) Contact privacy@gymwyse.com;
- (c) Adjust settings in Customer dashboard.
Mobile application users may disable push notifications through device settings.
- (a) Reviewing third-party privacy policies;
- (b) Ensuring compliance with Applicable Privacy Laws;
- (c) Obtaining necessary consents for data sharing;
- (d) Configuring integrations appropriately.
If Customer uses single sign-on (SSO) authentication, information may be shared with the identity provider according to the provider’s privacy policy.
- (a) Email notification to Customer’s registered email address at least thirty (30) days prior to effective date;
- (b) Prominent notice in Customer dashboard for at least thirty (30) days;
- (c) Updated “Last Updated” date at top of Policy.
- (a) New categories of Personal Information collected;
- (b) New purposes for Processing Personal Information;
- (c) New categories of third-party recipients;
- (d) Material reductions in data protection or security measures;
- (e) Changes to retention periods that significantly extend retention;
- (f) Changes to individual rights procedures that limit rights.
Previous versions of this Policy are available upon written request.
- (a) Implementing new technologies or Processing activities;
- (b) Processing is likely to result in high risk to individuals’ rights and freedoms;
- (c) Required by Applicable Privacy Laws.
Customer may request Company’s cooperation in conducting Customer’s own DPIAs related to the Service. Company will provide commercially reasonable assistance, subject to confidentiality limitations and for reasonable fees for extensive assistance.
- (a) Customer has all necessary rights, consents, and legal bases to collect and provide Personal Information to Company;
- (b) Customer complies with all Applicable Privacy Laws in its use of the Service;
- (c) Customer provides required privacy notices to End Users;
- (d) Customer obtains necessary consents from End Users;
- (e) Customer accurately classifies data sensitivity and implements appropriate controls;
- (f) Customer does not submit Sensitive Personal Information unless specifically authorized;
- (g) Customer promptly notifies Company of any data protection concerns or incidents;
- (h) Customer maintains its own privacy policy that accurately describes data practices;
- (i) Customer indemnifies Company for Customer’s violations of Applicable Privacy Laws.
- (a) Configuring privacy settings appropriately;
- (b) Implementing access controls and permissions;
- (c) Training Customer personnel on privacy practices;
- (d) Monitoring compliance with this Policy and applicable laws;
- (e) Promptly reporting suspected violations or security incidents.
- (a) Contract terms and conditions;
- (b) Privacy notices and disclosures;
- (c) Consent management;
- (d) Responding to End User requests and inquiries;
- (e) Disputes with End Users regarding privacy or data protection.
- (a) Commercial Arbitration Rules of the American Arbitration Association;
- (b) Single arbitrator selected by mutual agreement or AAA appointment procedures;
- (c) Arbitration venue: Denver, Colorado;
- (d) Each party bears its own costs and attorneys’ fees unless arbitrator awards fees to prevailing party;
- (e) Arbitrator’s decision is final and binding;
- (f) Judgment on award may be entered in any court of competent jurisdiction.
- (a) Claims for injunctive or equitable relief;
- (b) Small claims court matters (if within jurisdictional limits);
- (c) Intellectual property disputes;
- (d) Claims by regulators or government entities.
For matters not subject to arbitration, exclusive venue is the state and federal courts located in Denver, Colorado. Parties consent to personal jurisdiction in these courts.
- (a) THE SERVICE WILL MEET CUSTOMER’S REQUIREMENTS;
- (b) THE SERVICE WILL BE UNINTERRUPTED, TIMELY, SECURE, OR ERROR-FREE;
- (c) DATA WILL BE COMPLETELY SECURE FROM UNAUTHORIZED ACCESS;
- (d) DEFECTS OR ERRORS WILL BE CORRECTED;
- (e) THE SERVICE IS FREE FROM VIRUSES OR OTHER HARMFUL COMPONENTS.
- (a) INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, PUNITIVE, OR EXEMPLARY DAMAGES;
- (b) LOSS OF PROFITS, REVENUE, DATA, USE, GOODWILL, OR OTHER INTANGIBLE LOSSES;
- (c) DAMAGES RESULTING FROM:
- (i) USE OR INABILITY TO USE THE SERVICE;
- (ii) UNAUTHORIZED ACCESS TO OR ALTERATION OF DATA;
- (iii) STATEMENTS OR CONDUCT OF THIRD PARTIES;
- (iv) DATA BREACHES OR SECURITY INCIDENTS;
- (v) SYSTEM FAILURES OR INTERRUPTIONS;
- (vi) CUSTOMER’S VIOLATION OF APPLICABLE PRIVACY LAWS.
- (a) $1,000 USD; OR
- (b) AMOUNTS PAID BY CUSTOMER TO COMPANY IN THE TWELVE (12) MONTHS PRECEDING THE CLAIM.
- (a) Company’s gross negligence or willful misconduct;
- (b) Death or personal injury caused by Company’s negligence;
- (c) Fraud or fraudulent misrepresentation;
- (d) Liabilities that cannot be limited by applicable law;
- (e) Company’s indemnification obligations.
Customer acknowledges that liability limitations reflect allocation of risk and are essential elements of the bargain between parties. Service pricing reflects these limitations.
- (a) Customer’s use or misuse of the Service;
- (b) Customer’s violation of this Policy or Terms of Service;
- (c) Customer’s violation of Applicable Privacy Laws;
- (d) Customer’s collection, use, or disclosure of End User Personal Information;
- (e) Lack of proper consents, authorizations, or legal bases for Personal Information;
- (f) Customer’s failure to provide required privacy notices;
- (g) Claims by End Users regarding privacy or data protection;
- (h) Customer’s breach of representations and warranties;
- (i) Customer’s infringement of third-party intellectual property rights;
- (j) Customer’s violation of third-party rights;
- (k) Customer’s submission of Sensitive Personal Information without authorization;
- (l) Customer’s negligence or willful misconduct.
- (a) Promptly notify Customer of any claim subject to indemnification;
- (b) Provide Customer with reasonable cooperation and information;
- (c) Allow Customer to control defense and settlement (subject to restrictions below).
- (a) Admits fault or liability on behalf of Company Parties;
- (b) Imposes obligations on Company Parties without Company’s written consent;
- (c) Does not provide complete release of Company Parties.
- (a) Customer promptly notifying Company of the claim;
- (b) Company having sole control of defense and settlement;
- (c) Customer providing reasonable cooperation.
- (a) Modification of the Service by Customer or third parties;
- (b) Customer’s combination of Service with other products;
- (c) Customer’s use of Service contrary to documentation or agreements;
- (d) Content or data provided by Customer.
- (a) Such provision shall be reformed to the minimum extent necessary to make it enforceable, valid, and legal while preserving original intent;
- (b) If reformation is not possible, such provision shall be severed from this Policy;
- (c) All other provisions shall remain in full force and effect;
- (d) Unenforceability in one jurisdiction does not affect enforceability in other jurisdictions.
Any waiver granted by Company applies only to the specific instance and does not constitute a continuing waiver or waiver of other provisions.
- (a) Merger, acquisition, or sale of assets;
- (b) Corporate reorganization or restructuring;
- (c) Assignment to an affiliate or subsidiary.
This Policy is binding upon and inures to the benefit of parties’ respective successors and permitted assigns.
- Signed Data Processing Addendum or Business Associate Agreement
- Master Services Agreement
- This Privacy Policy
- Terms of Service
The following sections survive termination or expiration of the Service or Customer’s account: Sections 3 (Data Controller and Processor Relationships), 7 (International Transfers), 8 (Data Security), 9 (Data Retention), 10 (Individual Rights), 21 (Customer Obligations), 22 (Dispute Resolution), 23 (Limitation of Liability), 24 (Indemnification), and all other provisions which by their nature should survive.
- (a) Acts of God, natural disasters, epidemics, pandemics;
- (b) War, terrorism, civil unrest, governmental actions;
- (c) Labor disputes, strikes, lockouts;
- (d) Internet or telecommunications failures;
- (e) Power outages or equipment failures;
- (f) Cyber attacks, hacking, or malicious activities;
- (g) Changes in laws or regulations.
During force majeure events, Company will use commercially reasonable efforts to mitigate effects and resume normal operations.
Mail: The Algorithm
ATTN: Privacy Officer
5031 Ashbrook Circle
Highlands Ranch, CO 80130
United States
Mail: The Algorithm
ATTN: Security Team
5031 Ashbrook Circle
Highlands Ranch, CO 80130
United States
Email: legal@gymwyse.com
Mail: The Algorithm
ATTN: Legal Department
5031 Ashbrook Circle
Highlands Ranch, CO 80130
United States
- (a) Customer has read and understood this Privacy Policy in its entirety;
- (b) Customer agrees to be bound by all terms and conditions contained herein;
- (c) Customer has authority to bind its organization to this Policy;
- (d) Customer will ensure its employees, contractors, and agents comply with this Policy;
- (e) Customer understands its obligations as a Data Controller;
- (f) Customer accepts risks associated with data Processing and international transfers;
- (g) Customer acknowledges limitations on Company’s liability;
- (h) This Policy may be updated from time to time in accordance with Section 20.
Effective Date: October 13, 2025
Document Version: 1.0
Document ID: GYMWYSE-PP-2025-001
Piyoosh Rai
