At Wassup, we understand that privacy is important to you, and we are committed to respecting your privacy when you visit a Wassup web site such
gather from you through our Site and our on-line services, how we use and disclose this information, and who we might share this information with.
You need a valid email address to create account in Wassup.co. We store your email id, full name & wassup password information from you when you create an account in Wassup.co, which is used to protect your account from unauthorized access.
When you create an account, Wassup will create a public profile. Right now, we represent people who think about you as circles. The size of the circles is proportional to the number of thoughts & to each other.
A non-friend will get to see blank circles. A friend shall see his/her name inside the circle representing him/her.
Wassup only provides the tools to convey & track your passing thoughts. It cannot and does not provide any guarantee whatsoever that it will be able to satisfy the expectations of all its users.
We do not guarantee the accuracy of the content in our website.
Although efforts have been made to make this site available at all times, Wassup cannot offer any such guarantees about it.
We cannot guarantee that your thoughts will be preserved forever or it will always reach the recipient.
Wassup cannot be held responsible for any direct or indirect damages that may occur when using, or, on the contrary, being unable to use the site.
Wassup is not responsible for any kind or forms of omissions or errors on the site and the damages arising out of it, even if Wassup had been warned that such losses could occur.
4) Disclosing information
We cooperate with law enforcement inquiries, as well as other third parties, to enforce laws such as those regarding intellectual property rights,
fraud and other personal rights. WE CAN (AND YOU AUTHORIZE US TO) DISCLOSE ANY INFORMATION ABOUT YOU TO LAW ENFORCEMENT, OTHER GOVERNMENT OFFICIALS,
OR ANY OTHER THIRD PARTY THAT WE, IN OUR SOLE DISCRETION, BELIEVE NECESSARY OR APPROPRIATE IN CONNECTION WITH AN INVESTIGATION OF FRAUD,
INTELLECTUAL PROPERTY INFRINGEMENT, OR OTHER ACTIVITY THAT IS ILLEGAL OR MAY EXPOSE US, OR YOU, TO LIABILITY.
5) Log Files
As a standard practice, we use log files to record various interactions which might be used for debugging or trouble shooting the code.
This may include tracks of the act of conveying a thought too.
6) Logins and Logout