- Faster download speeds
- Higher completion rates
- Detailed performance data
- Fully customized UI
July 31, 2013
INFORMATION THAT WE COLLECT
RTI does not collect personally identifying information when you use our products and services. RTI offers content delivery services that do not require you to register or provide any personal information to us. However, in order to operate our Network we may collect the following types of information:
Log information - When you use the Software to download a file published into our Network by one of our media customers, our servers automatically record information that pertains to your file transfer. These logs may include information such as your Internet Protocol address, browser type, browser language, the date and time of your transfer as well as reports on the progress and completion of the file transfer.
Crash Reports - A sample of crashes in the Software may be reported to an automatic analysis system. These reports are then analyzed by our engineers and issues are fixed in future versions of the software. These reports help us to maintain and improve the quality of our products and services.
User communications - When you send email or other communications to RTI, we may retain those communications in order to process your inquiries, respond to your requests and improve our services.
Advertisers - We may allow advertisers, third party advertising networks and third-party advertising serving companies and other companies to serve or enable other sites to serve advertisements directly to you, and/or enable other services through the use of RTI's (and affiliates) websites, services, and Software. By serving these advertisements directly to you, these companies can set their own cookies on your computer and trigger their own Web beacons.
We take appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data. These include internal reviews of our data collection, storage and processing practices and security measures, as well as physical security measures to guard against unauthorized access to systems where we store personal data.
CHANGES TO THIS STATEMENT